mirror of
https://github.com/django/django.git
synced 2025-10-24 06:06:09 +00:00
Fixed CVE-2019-14235 -- Fixed potential memory exhaustion in django.utils.encoding.uri_to_iri().
Thanks to Guido Vranken for initial report.
This commit is contained in:
committed by
Carlton Gibson
parent
7deeabc7c7
commit
76ed1c49f8
@@ -45,3 +45,13 @@ CVE-2019-14234: SQL injection possibility in key and index lookups for ``JSONFie
|
||||
<hstorefield.key>` for :class:`~django.contrib.postgres.fields.HStoreField`
|
||||
were subject to SQL injection, using a suitably crafted dictionary, with
|
||||
dictionary expansion, as the ``**kwargs`` passed to ``QuerySet.filter()``.
|
||||
|
||||
CVE-2019-14235: Potential memory exhaustion in ``django.utils.encoding.uri_to_iri()``
|
||||
=====================================================================================
|
||||
|
||||
If passed certain inputs, :func:`django.utils.encoding.uri_to_iri` could lead
|
||||
to significant memory usage due to excessive recursion when re-percent-encoding
|
||||
invalid UTF-8 octet sequences.
|
||||
|
||||
``uri_to_iri()`` now avoids recursion when re-percent-encoding invalid UTF-8
|
||||
octet sequences.
|
||||
|
||||
@@ -45,3 +45,13 @@ CVE-2019-14234: SQL injection possibility in key and index lookups for ``JSONFie
|
||||
<hstorefield.key>` for :class:`~django.contrib.postgres.fields.HStoreField`
|
||||
were subject to SQL injection, using a suitably crafted dictionary, with
|
||||
dictionary expansion, as the ``**kwargs`` passed to ``QuerySet.filter()``.
|
||||
|
||||
CVE-2019-14235: Potential memory exhaustion in ``django.utils.encoding.uri_to_iri()``
|
||||
=====================================================================================
|
||||
|
||||
If passed certain inputs, :func:`django.utils.encoding.uri_to_iri` could lead
|
||||
to significant memory usage due to excessive recursion when re-percent-encoding
|
||||
invalid UTF-8 octet sequences.
|
||||
|
||||
``uri_to_iri()`` now avoids recursion when re-percent-encoding invalid UTF-8
|
||||
octet sequences.
|
||||
|
||||
@@ -46,6 +46,16 @@ CVE-2019-14234: SQL injection possibility in key and index lookups for ``JSONFie
|
||||
were subject to SQL injection, using a suitably crafted dictionary, with
|
||||
dictionary expansion, as the ``**kwargs`` passed to ``QuerySet.filter()``.
|
||||
|
||||
CVE-2019-14235: Potential memory exhaustion in ``django.utils.encoding.uri_to_iri()``
|
||||
=====================================================================================
|
||||
|
||||
If passed certain inputs, :func:`django.utils.encoding.uri_to_iri` could lead
|
||||
to significant memory usage due to excessive recursion when re-percent-encoding
|
||||
invalid UTF-8 octet sequences.
|
||||
|
||||
``uri_to_iri()`` now avoids recursion when re-percent-encoding invalid UTF-8
|
||||
octet sequences.
|
||||
|
||||
Bugfixes
|
||||
========
|
||||
|
||||
|
||||
Reference in New Issue
Block a user