First published: Wed May 07 2025(Updated: )
Elias Myllymäki discovered that Django incorrectly handled stripping large sequences of incomplete HTML tags. A remote attacker could possibly use this issue to cause Django to consume resources, leading to a denial of service.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7501-1 is classified as medium due to the potential for denial of service.
To fix USN-7501-1, update the python3-django package to the recommended version for your Ubuntu release.
USN-7501-1 affects several versions of Django including 2.2, 3.2, and 4.2 up to specified limitations.
Yes, a remote attacker can exploit the vulnerability in USN-7501-1 to cause resource consumption.
Rebooting may not be necessary after applying the update for USN-7501-1, but it is a good practice to ensure all services restart cleanly.