CVE-2018-7537 log
| Source | 
							
  | 
					
| Severity | Medium | 
| Remote | Yes | 
| Type | Denial of service | 
| Description | If django.utils.text.Truncator’s chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.  | 
					
| Group | Package | Affected | Fixed | Severity | Status | Ticket | 
|---|---|---|---|---|---|---|
| AVG-649 | python-django, python2-django | 1.11.10-1 | 1.11.11-1 | Medium | Fixed | 
| Date | Advisory | Group | Package | Severity | Type | 
|---|---|---|---|---|---|
| 06 Mar 2018 | ASA-201803-6 | AVG-649 | python2-django | Medium | denial of service | 
| 06 Mar 2018 | ASA-201803-5 | AVG-649 | python-django | Medium | denial of service | 
| References | 
|---|
https://docs.djangoproject.com/en/dev/releases/1.11.11/ https://github.com/django/django/commit/97b7dd59bb8d6163239061e2022153c3415d146d  |