Fedora 38: python-django3 2024-84fbbbb914 Security Advisory Updates
Summary
Django is a high-level Python Web framework that encourages rapid
development and a clean, pragmatic design. It focuses on automating as
much as possible and adhering to the DRY (Don't Repeat Yourself)
principle.
Update Information:
Security fixes for CVE-2024-27351 Potential regular expression DOS in django.utils.text.Truncator.words() CVE-2024-24680 denial-of-service in intcomma template filter CVE-2023-43665 Denial-of-service possibility in django.utils.text.Truncator CVE-2023-41164 Potential DOS vulnerability in django.utils.encoding.uri_to_iri() CVE-2023-36053 Potential regular expression denial of service vulnerability in EmailValidator/URLValidator
Change Log
* Thu Apr 11 2024 Michel Lind
References
[ 1 ] Bug #2219382 - CVE-2023-36053 python-django3: python-django: Potential regular expression denial of service vulnerability in EmailValidator/URLValidator [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2219382 [ 2 ] Bug #2237871 - CVE-2023-41164 python-django3: python-django: Potential denial of service vulnerability in ``django.utils.encoding.uri_to_iri()`` [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2237871 [ 3 ] Bug #2242181 - CVE-2023-43665 python-django3: python-django: Denial-of-service possibility in django.utils.text.Truncator [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2242181 [ 4 ] Bug #2263506 - CVE-2024-24680 python-django3: Django: denial-of-service in ``intcomma`` template filter [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2263506 [ 5 ] Bug #2267655 - CVE-2024-27351 python-django3: python-django: Potential regular expression denial-of-service in django.utils.text.Truncator.words() [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2267655
Update Instructions
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2024-84fbbbb914' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label