[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3191-1] python-django security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3191-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
November 17, 2022                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : python-django
Version        : 1:1.11.29-1+deb10u4
CVE IDs        : CVE-2021-45452 CVE-2022-22818 CVE-2022-23833
Debian Bugs    : 1003113 1004752

Multiple issues were discovered in Django, a Python-based web
development framework:

 * CVE-2021-45452: Storage.save allowed directory traversal if
   crafted filenames were passed directlyto it.

 * CVE-2022-22818: The {% debug %} template tag did not properly
   encode the current context. This may lead to a cross-site
   scripting (XSS) vulnerability.

 * CVE-2022-23833: The HTTP MultiPartParser had a issue whereby
   certain inputs to multipart forms could result in an infinite loop
   when parsing uploaded files.

For Debian 10 buster, these problems have been fixed in version
1:1.11.29-1+deb10u4.

We recommend that you upgrade your python-django packages.

For the detailed security status of python-django please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-django

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
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=4S8x
-----END PGP SIGNATURE-----


Reply to: