[security-announce] openSUSE-SU-2019:1872-1: moderate: Security update for python-Django
openSUSE Security Update: Security update for python-Django ______________________________________________________________________________ Announcement ID: openSUSE-SU-2019:1872-1 Rating: moderate References: #1136468 #1139945 #1142880 #1142882 #1142883 #1142885 Cross-References: CVE-2019-11358 CVE-2019-12308 CVE-2019-12781 CVE-2019-14232 CVE-2019-14233 CVE-2019-14234 CVE-2019-14235 Affected Products: openSUSE Backports SLE-15-SP1 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for python-Django fixes the following issues: Security issues fixed: - CVE-2019-11358: Fixed prototype pollution. - CVE-2019-12308: Fixed XSS in AdminURLFieldWidget (bsc#1136468) - CVE-2019-12781: Fixed incorrect HTTP detection with reverse-proxy connecting via HTTPS (bsc#1139945). - CVE-2019-14232: Fixed denial-of-service possibility in ``django.utils.text.Truncator`` (bsc#1142880). - CVE-2019-14233: Fixed denial-of-service possibility in ``strip_tags()`` (bsc#1142882). - CVE-2019-14234: Fixed SQL injection possibility in key and index lookups for ``JSONField``/``HStoreField`` (bsc#1142883). - CVE-2019-14235: Fixed potential memory exhaustion in ``django.utils.encoding.uri_to_iri()`` (bsc#1142885). Non-security issues fixed: - Fixed a migration crash on PostgreSQL when adding a check constraint with a contains lookup on DateRangeField or DateTimeRangeField, if the right hand side of an expression is the same type. This update was imported from the openSUSE:Leap:15.1:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP1: zypper in -t patch openSUSE-2019-1872=1 Package List: - openSUSE Backports SLE-15-SP1 (noarch): python3-Django-2.2.4-bp151.3.3.1 References: https://www.suse.com/security/cve/CVE-2019-11358.html https://www.suse.com/security/cve/CVE-2019-12308.html https://www.suse.com/security/cve/CVE-2019-12781.html https://www.suse.com/security/cve/CVE-2019-14232.html https://www.suse.com/security/cve/CVE-2019-14233.html https://www.suse.com/security/cve/CVE-2019-14234.html https://www.suse.com/security/cve/CVE-2019-14235.html https://bugzilla.suse.com/1136468 https://bugzilla.suse.com/1139945 https://bugzilla.suse.com/1142880 https://bugzilla.suse.com/1142882 https://bugzilla.suse.com/1142883 https://bugzilla.suse.com/1142885 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org