| Name | CVE-2019-14232 |
| Description | An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-1872-1, DSA-4498-1 |
| Debian Bugs | 934026 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| python-django (PTS) | bullseye | 2:2.2.28-1~deb11u2 | fixed |
| bullseye (security) | 2:2.2.28-1~deb11u11 | fixed | |
| bookworm, bookworm (security) | 3:3.2.19-1+deb12u1 | fixed | |
| trixie | 3:4.2.23-1 | fixed | |
| trixie (security) | 3:4.2.27-0+deb13u1 | fixed | |
| forky | 3:4.2.27-2 | fixed | |
| sid | 3:4.2.28-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| python-django | source | jessie | 1.7.11-1+deb8u7 | DLA-1872-1 | ||
| python-django | source | stretch | 1:1.10.7-2+deb9u6 | DSA-4498-1 | ||
| python-django | source | buster | 1:1.11.23-1~deb10u1 | DSA-4498-1 | ||
| python-django | source | (unstable) | 2:2.2.4-1 | 934026 |
https://www.djangoproject.com/weblog/2019/aug/01/security-releases/
https://github.com/django/django/commit/c3289717c6f21a8cf23daff1c78c0c014b94041f (2.2.x)
https://github.com/django/django/commit/42a66e969023c00536256469f0e8b8a099ef109d (1.11.x)