An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.striptags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of striptags().
{ "ubuntu_priority": "medium", "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "python-django", "binary_version": "1:1.11.11-1ubuntu1.21+esm11" }, { "binary_name": "python-django-common", "binary_version": "1:1.11.11-1ubuntu1.21+esm11" }, { "binary_name": "python-django-doc", "binary_version": "1:1.11.11-1ubuntu1.21+esm11" }, { "binary_name": "python3-django", "binary_version": "1:1.11.11-1ubuntu1.21+esm11" } ] }