openSUSE-SU-2024:0251-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2024:0251-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2024:0251-1
Related
Published
2024-08-18T07:32:42Z
Modified
2024-08-18T07:32:42Z
Summary
Security update for python-Django
Details

This update for python-Django fixes the following issues:

  • CVE-2023-23969: Potential denial-of-service via Accept-Language headers (boo#1207565)
  • CVE-2024-38875: Potential denial-of-service attack via certain inputs with a very large number of brackets (boo#1227590)
  • CVE-2024-39329: Username enumeration through timing difference for users with unusable passwords (boo#1227593)
  • CVE-2024-39330: Potential directory traversal in django.core.files.storage.Storage.save() (boo#1227594)
  • CVE-2024-39614: Potential denial-of-service through django.utils.translation.getsupportedlanguage-variant() (boo#1227595)
References

Affected packages

SUSE:Package Hub 15 SP5 / python-Django

Package

Name
python-Django
Purl
purl:rpm/suse/python-Django&distro=SUSE%20Package%20Hub%2015%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.28-bp155.7.12.1

Ecosystem specific

{
    "binaries": [
        {}
    ]
}

openSUSE:Leap 15.5 / python-Django

Package

Name
python-Django
Purl
purl:rpm/suse/python-Django&distro=openSUSE%20Leap%2015.5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.28-bp155.7.12.1

Ecosystem specific

{
    "binaries": [
        {}
    ]
}