Hide Forgot
If passed certain inputs, :func:django.utils.encoding.uri_to_iri could lead to significant memory usage due to excessive recursion when re-percent-encoding invalid UTF-8 octet sequences.
Created python-django tracking bugs for this issue: Affects: epel-7 [bug 1735781] Affects: fedora-29 [bug 1735783] Affects: fedora-30 [bug 1735784] Created python-django16 tracking bugs for this issue: Affects: epel-7 [bug 1735782]
External References: https://www.djangoproject.com/weblog/2019/aug/01/security-releases/
Upstream Patches for master branch, 1.11, 2.1 and 2.2 releases: https://github.com/django/django/commit/76ed1c49f804d409cfc2911a890c78584db3c76e https://github.com/django/django/commit/869b34e9b3be3a4cfcb3a145f218ffd3f5e3fd79 https://github.com/django/django/commit/5d50a2e5fa36ad23ab532fc54cf4073de84b3306 https://github.com/django/django/commit/cf694e6852b0da7799f8b53f1fb2f7d20cf17534
Red Hat OpenStack Platform: * This issue affects all versions of python-django shipped with Red Hat Openstack Platform versions 9-15, as it contains the vulnerable code. * Because the flaw's impact is Medium, it will not be fixed in Red Hat Openstack Platform 9 which is retiring on 8/24.
Acknowledgments: Name: the Django project
Statement: This issue affects the versions of python-django as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and 3, as it contains the vulnerable code. This issue affects Red Hat Update Infrastructure for Cloud Providers, but the vulnerable functions in python-django are currently not used in any part of the Product. This issue does not affect Red Hat Satellite as the vulnerable functions in python-django are not used. Red Hat OpenStack Platform: * This issue affects all versions of python-django shipped with Red Hat Openstack Platform versions 9-15, as it contains the vulnerable code. * Because the flaw's impact is Medium, it will not be fixed in Red Hat Openstack Platform 9 which is retiring 8/24.
This issue has been addressed in the following products: Red Hat OpenStack Platform 15.0 (Stein) Via RHSA-2020:1324 https://access.redhat.com/errata/RHSA-2020:1324
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-14235
This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 (Queens) Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS Via RHSA-2020:4390 https://access.redhat.com/errata/RHSA-2020:4390