drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Django
Name: |
Mehrere Probleme in Django |
|
ID: |
202004-17 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Fr, 1. Mai 2020, 09:58 |
|
Referenzen: |
https://nvd.nist.gov/vuln/detail/CVE-2019-14235
https://nvd.nist.gov/vuln/detail/CVE-2019-14233
https://nvd.nist.gov/vuln/detail/CVE-2020-7471
https://nvd.nist.gov/vuln/detail/CVE-2019-14234
https://nvd.nist.gov/vuln/detail/CVE-2020-9402
https://nvd.nist.gov/vuln/detail/CVE-2019-12308
https://nvd.nist.gov/vuln/detail/CVE-2019-14232
https://nvd.nist.gov/vuln/detail/CVE-2019-19118
https://nvd.nist.gov/vuln/detail/CVE-2019-19844 |
|
Applikationen: |
Django |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --vuuKFYyXr3ukAVnsJF2STUioXvqGC4Ad7 Content-Type: multipart/mixed; boundary="385VS1HhBDAWvB2YcERYf0CPGdwSBMbnS"
--385VS1HhBDAWvB2YcERYf0CPGdwSBMbnS Content-Type: text/plain; charset=utf-8 Content-Language: en-U Content-Transfer-Encoding: quoted-printable
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202004-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal Title: Django: Multiple vulnerabilities Date: April 30, 2020 Bugs: #692384, #701744, #706204, #707998, #711522 ID: 202004-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis ========
Multiple vulnerabilities have been found in Django, the worst of which could result in privilege escalation.
Background ==========
Django is a Python-based web framework.
Affected packages =================
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-python/django < 2.2.11 >= 2.2.11
Description ===========
Multiple vulnerabilities have been discovered in Django. Please review the CVE identifiers referenced below for details.
Impact ======
A remote attacker, by sending specially crafted input, could possibly cause a Denial of Service condition, or alter the database.
Workaround ==========
There is no known workaround at this time.
Resolution ==========
All Django users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-python/django-2.2.11"
References ==========
[ 1 ] CVE-2019-12308 https://nvd.nist.gov/vuln/detail/CVE-2019-12308 [ 2 ] CVE-2019-14232 https://nvd.nist.gov/vuln/detail/CVE-2019-14232 [ 3 ] CVE-2019-14233 https://nvd.nist.gov/vuln/detail/CVE-2019-14233 [ 4 ] CVE-2019-14234 https://nvd.nist.gov/vuln/detail/CVE-2019-14234 [ 5 ] CVE-2019-14235 https://nvd.nist.gov/vuln/detail/CVE-2019-14235 [ 6 ] CVE-2019-19118 https://nvd.nist.gov/vuln/detail/CVE-2019-19118 [ 7 ] CVE-2019-19844 https://nvd.nist.gov/vuln/detail/CVE-2019-19844 [ 8 ] CVE-2020-7471 https://nvd.nist.gov/vuln/detail/CVE-2020-7471 [ 9 ] CVE-2020-9402 https://nvd.nist.gov/vuln/detail/CVE-2020-9402
Availability ============
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202004-17
Concerns? =========
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License =======
Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
--385VS1HhBDAWvB2YcERYf0CPGdwSBMbnS--
--vuuKFYyXr3ukAVnsJF2STUioXvqGC4Ad7 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQGTBAEBCgB9FiEEExKRzo+LDXJgXHuURObr3Jv2BVkFAl6rX8dfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDEz MTI5MUNFOEY4QjBENzI2MDVDN0I5NDQ0RTZFQkRDOUJGNjA1NTkACgkQRObr3Jv2 BVlr4gf+I6zH1+m68g/BTEhFVmbsAMA4BRviaTgJAcpYs6jLky6mjuD0hf127Lk2 VgoE3gOsAzV9z6r6II1J4wV1czKQ/wx8OH5Ca4wF+g6Gj87CAkpWuvKQ7GQfGlg/ 6Zn39PbH6+hb9yqkGFVDoVzSLofkohhdBsTZsrBLaY+Vd9wvgNl8jkAUvtWlQ7hO 3L609zlOFB418zhwQlLMCJ8MYUmm7Y4Pv2/7M5blANWkq1ZZZ2RcD1xFeXgObAtt +JP8uoar3I/RCoAzmYa1ryIy7SrTpgx2oJM+coZYUOzGFTWAZGhf3IjfLMes4l7o k/p7w//d9WOzgY1nrJ3XRkOk+jQq/g== =mHYp -----END PGP SIGNATURE-----
--vuuKFYyXr3ukAVnsJF2STUioXvqGC4Ad7--
|
|
|
|