The urlize() and urlizetrunc() template filters were subject to a potential
denial-of-service attack via very large inputs with a specific sequence of
characters.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | python-django | < 1:1.11.11-1ubuntu1.21+esm7 | UNKNOWN |
ubuntu | 20.04 | noarch | python-django | < 2:2.2.12-1ubuntu0.25 | UNKNOWN |
ubuntu | 22.04 | noarch | python-django | < 2:3.2.12-2ubuntu1.14 | UNKNOWN |
ubuntu | 24.04 | noarch | python-django | < 3:4.2.11-1ubuntu1.3 | UNKNOWN |
ubuntu | 14.04 | noarch | python-django | < any | UNKNOWN |
ubuntu | 16.04 | noarch | python-django | < any | UNKNOWN |