ALT-PU-2023-2964-1
Package python3-module-django updated to version 3.2.18-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-00662
Уязвимость программной платформы для веб-приложений Django, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-23969
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
- https://docs.djangoproject.com/en/4.1/releases/security/
- https://docs.djangoproject.com/en/4.1/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- [debian-lts-announce] 20230201 [SECURITY] [DLA 3306-1] python-django security update
- [debian-lts-announce] 20230201 [SECURITY] [DLA 3306-1] python-django security update
- FEDORA-2023-8fed428c5e
- FEDORA-2023-8fed428c5e
- FEDORA-2023-a53ab7c969
- FEDORA-2023-a53ab7c969
- https://security.netapp.com/advisory/ntap-20230302-0007/
- https://security.netapp.com/advisory/ntap-20230302-0007/
- https://www.djangoproject.com/weblog/2023/feb/01/security-releases/
- https://www.djangoproject.com/weblog/2023/feb/01/security-releases/
Modified: 2024-11-21
CVE-2023-24580
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
- http://www.openwall.com/lists/oss-security/2023/02/14/1
- http://www.openwall.com/lists/oss-security/2023/02/14/1
- https://docs.djangoproject.com/en/4.1/releases/security/
- https://docs.djangoproject.com/en/4.1/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- [debian-lts-announce] 20230220 [SECURITY] [DLA 3329-1] python-django security update
- [debian-lts-announce] 20230220 [SECURITY] [DLA 3329-1] python-django security update
- FEDORA-2023-bde7913e5a
- FEDORA-2023-bde7913e5a
- FEDORA-2023-8fed428c5e
- FEDORA-2023-8fed428c5e
- FEDORA-2023-a53ab7c969
- FEDORA-2023-a53ab7c969
- FEDORA-2023-3d775d93be
- FEDORA-2023-3d775d93be
- FEDORA-2023-a74513bda8
- FEDORA-2023-a74513bda8
- https://security.netapp.com/advisory/ntap-20230316-0006/
- https://security.netapp.com/advisory/ntap-20230316-0006/
- https://www.djangoproject.com/weblog/2023/feb/14/security-releases/
- https://www.djangoproject.com/weblog/2023/feb/14/security-releases/