SUSE-SU-2024:2545-1

Source
https://www.suse.com/support/update/announcement/2024/suse-su-20242545-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:2545-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2024:2545-1
Related
Published
2024-07-17T11:58:55Z
Modified
2024-07-17T11:58:55Z
Summary
Security update for python-Django
Details

This update for python-Django fixes the following issues:

  • CVE-2024-38875: Fixed potential denial-of-service attack via certain inputs with a very large number of brackets (bsc#1227590)
  • CVE-2024-39329: Fixed username enumeration through timing difference for users with unusable passwords (bsc#1227593)
  • CVE-2024-39330: Fixed potential directory traversal in django.core.files.storage.Storage.save() (bsc#1227594)
  • CVE-2024-39614: Fixed potential denial-of-service through django.utils.translation.getsupportedlanguage_variant() (bsc#1227595)
  • CVE-2023-23969: Fixed potential denial-of-service via Accept-Language headers (bsc#1207565)
References

Affected packages

openSUSE:Leap 15.5 / python-Django

Package

Name
python-Django
Purl
purl:rpm/suse/python-Django&distro=openSUSE%20Leap%2015.5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.7-150000.1.20.1

Ecosystem specific

{
    "binaries": [
        {
            "python3-Django": "2.0.7-150000.1.20.1"
        }
    ]
}