An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
{
"binaries": [
{
"binary_version": "1:1.11.11-1ubuntu1.21+esm6",
"binary_name": "python-django"
},
{
"binary_version": "1:1.11.11-1ubuntu1.21+esm6",
"binary_name": "python-django-common"
},
{
"binary_version": "1:1.11.11-1ubuntu1.21+esm6",
"binary_name": "python3-django"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}