Lucene search

K
suseSuseOPENSUSE-SU-2019:1839-1
HistoryAug 08, 2019 - 12:00 a.m.

Security update for python-Django (moderate)

2019-08-0800:00:00
lists.opensuse.org
73

0.035 Low

EPSS

Percentile

91.6%

An update that fixes 7 vulnerabilities is now available.

Description:

This update for python-Django fixes the following issues:

Security issues fixed:

  • CVE-2019-11358: Fixed prototype pollution.
  • CVE-2019-12308: Fixed XSS in AdminURLFieldWidget (bsc#1136468)
  • CVE-2019-12781: Fixed incorrect HTTP detection with reverse-proxy
    connecting via HTTPS (bsc#1139945).
  • CVE-2019-14232: Fixed denial-of-service possibility in
    django.utils.text.Truncator (bsc#1142880).
  • CVE-2019-14233: Fixed denial-of-service possibility in strip_tags()
    (bsc#1142882).
  • CVE-2019-14234: Fixed SQL injection possibility in key and index lookups
    for JSONField/HStoreField (bsc#1142883).
  • CVE-2019-14235: Fixed potential memory exhaustion in
    django.utils.encoding.uri_to_iri() (bsc#1142885).

Non-security issues fixed:

  • Fixed a migration crash on PostgreSQL when adding a check constraint
    with a contains lookup on DateRangeField or DateTimeRangeField, if the
    right hand side of an expression is the same type.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2019-1839=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.1noarch< - openSUSE Leap 15.1 (noarch):- openSUSE Leap 15.1 (noarch):.noarch.rpm