Mailinglist Archive: opensuse-updates (119 mails)

< Previous Next >
openSUSE-SU-2018:0826-1: moderate: Security update for python-Django
openSUSE Security Update: Security update for python-Django
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:0826-1
Rating: moderate
References: #1001374 #1008047 #1008050 #1031450 #1031451
#1056284 #1083304 #1083305 #967999 #968000

Cross-References: CVE-2016-2048 CVE-2016-2512 CVE-2016-2513
CVE-2016-6186 CVE-2016-7401 CVE-2016-9013
CVE-2016-9014 CVE-2017-12794 CVE-2017-7233
CVE-2017-7234 CVE-2018-7536 CVE-2018-7537

Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes 12 vulnerabilities is now available.

Description:

This update for python-Django to version 1.18.18 fixes multiple issues.

Security issues fixed:

- CVE-2018-7537: Fixed catastrophic backtracking in
django.utils.text.Truncator. (bsc#1083305)
- CVE-2018-7536: Fixed catastrophic backtracking in urlize and urlizetrunc
template filters (bsc#1083304).
- CVE-2016-7401: CSRF protection bypass on a site with Google Analytics
(bsc#1001374).
- CVE-2016-2513: User enumeration through timing difference on password
hasher work factor upgrade (bsc#968000).
- CVE-2016-2512: Fixed malicious redirect and possible XSS attack via
user-supplied redirect URLs containing basic auth (bsc#967999).
- CVE-2016-9013: User with hardcoded password created when running tests
on Oracle (bsc#1008050).
- CVE-2016-9014: DNS rebinding vulnerability when DEBUG=True (bsc#1008047).
- CVE-2017-7234: Open redirect vulnerability in
django.views.static.serve() (bsc#1031451).
- CVE-2017-7233: Open redirect and possible XSS attack via user-supplied
numeric redirect URLs (bsc#1031450).
- CVE-2017-12794: Fixed XSS possibility in traceback section of technical
500 debug page (bsc#1056284)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-317=1



Package List:

- openSUSE Leap 42.3 (noarch):

python-Django-1.8.19-6.4.1


References:

https://www.suse.com/security/cve/CVE-2016-2048.html
https://www.suse.com/security/cve/CVE-2016-2512.html
https://www.suse.com/security/cve/CVE-2016-2513.html
https://www.suse.com/security/cve/CVE-2016-6186.html
https://www.suse.com/security/cve/CVE-2016-7401.html
https://www.suse.com/security/cve/CVE-2016-9013.html
https://www.suse.com/security/cve/CVE-2016-9014.html
https://www.suse.com/security/cve/CVE-2017-12794.html
https://www.suse.com/security/cve/CVE-2017-7233.html
https://www.suse.com/security/cve/CVE-2017-7234.html
https://www.suse.com/security/cve/CVE-2018-7536.html
https://www.suse.com/security/cve/CVE-2018-7537.html
https://bugzilla.suse.com/1001374
https://bugzilla.suse.com/1008047
https://bugzilla.suse.com/1008050
https://bugzilla.suse.com/1031450
https://bugzilla.suse.com/1031451
https://bugzilla.suse.com/1056284
https://bugzilla.suse.com/1083304
https://bugzilla.suse.com/1083305
https://bugzilla.suse.com/967999
https://bugzilla.suse.com/968000


< Previous Next >
This Thread
  • No further messages