CVE-2015-2316
Published: 19 March 2015
The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string.
Priority
Status
Package | Release | Status |
---|---|---|
python-django Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
(1.1.1-2ubuntu1.16)
|
precise |
Not vulnerable
(1.3.1-4ubuntu1.15)
|
|
trusty |
Released
(1.6.1-2ubuntu0.8)
|
|
upstream |
Released
(1.4.20,1.6.11,1.7.7,1.8c1)
|
|
utopic |
Released
(1.6.6-1ubuntu2.2)
|
|
Patches: upstream: https://github.com/django/django/commit/e63363f8e075fa8d66326ad6a1cc3391cc95cd97 upstream: https://github.com/django/django/commit/d1503afd66ca8f2f8d3819ba8a60727e0ee66cec upstream: https://github.com/django/django/commit/f05f5c231a916082b5fa2e0980fbf7abeb390032 upstream: https://github.com/django/django/commit/c9b2feffeed46765ed6c4b74066059e2a6541735 upstream: https://github.com/django/django/commit/b6b3cb9899214a23ebb0f4ebf0e0b300b0ee524f |