CVE-2018-7537 log

Source
Severity Medium
Remote Yes
Type Denial of service
Description
If django.utils.text.Truncator’s chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
Group Package Affected Fixed Severity Status Ticket
AVG-649 python-django, python2-django 1.11.10-1 1.11.11-1 Medium Fixed
Date Advisory Group Package Severity Type
06 Mar 2018 ASA-201803-6 AVG-649 python2-django Medium denial of service
06 Mar 2018 ASA-201803-5 AVG-649 python-django Medium denial of service
References
https://docs.djangoproject.com/en/dev/releases/1.11.11/
https://github.com/django/django/commit/97b7dd59bb8d6163239061e2022153c3415d146d