Mailinglist Archive: opensuse-updates (119 mails)

< Previous Next >
openSUSE-SU-2018:0826-1: moderate: Security update for python-Django
openSUSE Security Update: Security update for python-Django

Announcement ID: openSUSE-SU-2018:0826-1
Rating: moderate
References: #1001374 #1008047 #1008050 #1031450 #1031451
#1056284 #1083304 #1083305 #967999 #968000

Cross-References: CVE-2016-2048 CVE-2016-2512 CVE-2016-2513
CVE-2016-6186 CVE-2016-7401 CVE-2016-9013
CVE-2016-9014 CVE-2017-12794 CVE-2017-7233
CVE-2017-7234 CVE-2018-7536 CVE-2018-7537

Affected Products:
openSUSE Leap 42.3

An update that fixes 12 vulnerabilities is now available.


This update for python-Django to version 1.18.18 fixes multiple issues.

Security issues fixed:

- CVE-2018-7537: Fixed catastrophic backtracking in
django.utils.text.Truncator. (bsc#1083305)
- CVE-2018-7536: Fixed catastrophic backtracking in urlize and urlizetrunc
template filters (bsc#1083304).
- CVE-2016-7401: CSRF protection bypass on a site with Google Analytics
- CVE-2016-2513: User enumeration through timing difference on password
hasher work factor upgrade (bsc#968000).
- CVE-2016-2512: Fixed malicious redirect and possible XSS attack via
user-supplied redirect URLs containing basic auth (bsc#967999).
- CVE-2016-9013: User with hardcoded password created when running tests
on Oracle (bsc#1008050).
- CVE-2016-9014: DNS rebinding vulnerability when DEBUG=True (bsc#1008047).
- CVE-2017-7234: Open redirect vulnerability in
django.views.static.serve() (bsc#1031451).
- CVE-2017-7233: Open redirect and possible XSS attack via user-supplied
numeric redirect URLs (bsc#1031450).
- CVE-2017-12794: Fixed XSS possibility in traceback section of technical
500 debug page (bsc#1056284)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-317=1

Package List:

- openSUSE Leap 42.3 (noarch):



< Previous Next >
This Thread
  • No further messages