MGASA-2019-0086

Source
https://advisories.mageia.org/MGASA-2019-0086.html
Import Source
https://advisories.mageia.org/MGASA-2019-0086.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2019-0086
Related
Published
2019-02-14T08:38:16Z
Modified
2019-02-14T08:09:07Z
Summary
Updated python-django packages fix security vulnerability
Details

If django.utils.numberformat.format() -- used by contrib.admin as well as the floatformat, filesizeformat, and intcomma templates filters -- received a Decimal with a large number of digits or a large exponent, it could lead to significant memory usage due to a call to '{:f}'.format() (CVE-2019-6975).

References
Credits

Affected packages

Mageia:6 / python-django

Package

Name
python-django
Purl
pkg:rpm/mageia/python-django?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.19-1.2.mga6

Ecosystem specific

{
    "section": "core"
}