ASA-201902-14 log generated external raw

[ASA-201902-14] python-django: denial of service
Arch Linux Security Advisory ASA-201902-14 ========================================== Severity: Medium Date : 2019-02-12 CVE-ID : CVE-2019-6975 Package : python-django Type : denial of service Remote : Yes Link : https://security.archlinux.org/AVG-881 Summary ======= The package python-django before version 2.1.6-1 is vulnerable to denial of service. Resolution ========== Upgrade to 2.1.6-1. # pacman -Syu "python-django>=2.1.6-1" The problem has been fixed upstream in version 2.1.6. Workaround ========== None. Description =========== Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows uncontrolled memory consumption via a malicious attacker- supplied value to the django.utils.numberformat.format() function. If the affected numberformat function as used by contrib.admin as well as the the floatformat, filesizeformat, and intcomma templates filters receives a Decimal with a large number of digits or a large exponent, it could lead to significant memory usage due to a call to '{:f}'.format(). Impact ====== A remote attacker is able to crash a target server that uses float- number-based filters by making the server filter numbers with very large exponents or number of digits. References ========== https://www.djangoproject.com/weblog/2019/feb/11/security-releases/ https://www.openwall.com/lists/oss-security/2019/02/11/1 https://github.com/django/django/commit/0bbb560183fabf0533289700845dafa94951f227 https://github.com/django/django/commit/40cd19055773705301c3428ed5e08a036d2091f3 https://security.archlinux.org/CVE-2019-6975