Summary: | <dev-python/django-1.0.4, =dev-python/django-1.1 suffer from potential DOS in forms library via EmailField or URLField (CVE-2009-3695) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Matt Summers (RETIRED) <quantumsummers> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | python |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.djangoproject.com/weblog/2009/oct/09/security/ | ||
Whiteboard: | ~3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Matt Summers (RETIRED)
2009-10-09 23:03:34 UTC
The new ebuilds have been added to the tree, and the vulnerable removed by Patrick. Awesome. CVE-2009-3695 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3695): Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression. 7 minutes from report to fix? Wow! Closing noglsa. |