An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1:1.11.11-1ubuntu1.21+esm7", "binary_name": "python-django" }, { "binary_version": "1:1.11.11-1ubuntu1.21+esm7", "binary_name": "python-django-common" }, { "binary_version": "1:1.11.11-1ubuntu1.21+esm7", "binary_name": "python-django-doc" }, { "binary_version": "1:1.11.11-1ubuntu1.21+esm7", "binary_name": "python3-django" } ] }