Date: Sat, 3 Aug 2019 20:57:32 +0000 (UTC) From: Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r508025 - head/security/vuxml Message-ID: <201908032057.x73KvWl4087036@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: sunpoet Date: Sat Aug 3 20:57:31 2019 New Revision: 508025 URL: https://svnweb.freebsd.org/changeset/ports/508025 Log: Document Django vulnerability Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Aug 3 20:57:24 2019 (r508024) +++ head/security/vuxml/vuln.xml Sat Aug 3 20:57:31 2019 (r508025) @@ -58,6 +58,89 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="6e65dfea-b614-11e9-a3a2-1506e15611cc"> + <topic>Django -- multiple vulnerabilities</topic> + <affects> + <package> + <name>py27-django111</name> + <name>py35-django111</name> + <name>py36-django111</name> + <name>py37-django111</name> + <range><lt>1.11.23</lt></range> + </package> + <package> + <name>py27-django21</name> + <name>py35-django21</name> + <name>py36-django21</name> + <name>py37-django21</name> + <range><lt>2.1.11</lt></range> + </package> + <package> + <name>py27-django22</name> + <name>py35-django22</name> + <name>py36-django22</name> + <name>py37-django22</name> + <range><lt>2.2.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Django release notes:</p> + <blockquote cite="https://docs.djangoproject.com/en/1.11/releases/1.11.23/"> + <p>CVE-2019-14232: Denial-of-service possibility in + django.utils.text.Truncator</p> + <p>If django.utils.text.Truncator's chars() and words() methods were + passed the html=True argument, they were extremely slow to evaluate + certain inputs due to a catastrophic backtracking vulnerability in a + regular expression. The chars() and words() methods are used to + implement the truncatechars_html and truncatewords_html template + filters, which were thus vulnerable</p> + <p>The regular expressions used by Truncator have been simplified in + order to avoid potential backtracking issues. As a consequence, trailing + punctuation may now at times be included in the truncated output.</p> + <p>CVE-2019-14233: Denial-of-service possibility in strip_tags()</p> + <p>Due to the behavior of the underlying HTMLParser, + django.utils.html.strip_tags() would be extremely slow to evaluate + certain inputs containing large sequences of nested incomplete HTML + entities. The strip_tags() method is used to implement the corresponding + striptags template filter, which was thus also vulnerable.</p> + <p>strip_tags() now avoids recursive calls to HTMLParser when progress + removing tags, but necessarily incomplete HTML entities, stops being + made.</p> + <p>Remember that absolutely NO guarantee is provided about the results of + strip_tags() being HTML safe. So NEVER mark safe the result of a + strip_tags() call without escaping it first, for example with + django.utils.html.escape().</p> + <p>CVE-2019-14234: SQL injection possibility in key and index lookups for + JSONField/HStoreField</p> + <p>Key and index lookups for JSONField and key lookups for HStoreField + were subject to SQL injection, using a suitably crafted dictionary, + with dictionary expansion, as the **kwargs passed to QuerySet.filter().</p> + <p>CVE-2019-14235: Potential memory exhaustion in + django.utils.encoding.uri_to_iri()</p> + <p>If passed certain inputs, django.utils.encoding.uri_to_iri() could lead + to significant memory usage due to excessive recursion when + re-percent-encoding invalid UTF-8 octet sequences.</p> + <p>uri_to_iri() now avoids recursion when re-percent-encoding invalid + UTF-8 octet sequences.</p> + </blockquote> + </body> + </description> + <references> + <url>https://docs.djangoproject.com/en/1.11/releases/1.11.23/</url> + <url>https://docs.djangoproject.com/en/2.1/releases/2.1.11/</url> + <url>https://docs.djangoproject.com/en/2.2/releases/2.2.4/</url> + <cvename>CVE-2019-14232</cvename> + <cvename>CVE-2019-14233</cvename> + <cvename>CVE-2019-14234</cvename> + <cvename>CVE-2019-14235</cvename> + </references> + <dates> + <discovery>2019-08-01</discovery> + <entry>2019-08-03</entry> + </dates> + </vuln> + <vuln vid="e7b69694-b3b5-11e9-9bb6-0800274e5f20"> <topic>gitea -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201908032057.x73KvWl4087036>