SUSE-SU-2018:1102-1: moderate: Security update for python-Django

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Apr 27 13:09:17 MDT 2018


   SUSE Security Update: Security update for python-Django
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:1102-1
Rating:             moderate
References:         #1001374 #1008047 #1008050 #1031450 #1031451 
                    #1056284 #1083304 #1083305 #967999 
Cross-References:   CVE-2016-2512 CVE-2016-7401 CVE-2016-9013
                    CVE-2016-9014 CVE-2017-12794 CVE-2017-7233
                    CVE-2017-7234 CVE-2018-7536 CVE-2018-7537
                   
Affected Products:
                    SUSE OpenStack Cloud 6
______________________________________________________________________________

   An update that fixes 9 vulnerabilities is now available.

Description:

   This update for python-Django fixes the following issues:

   Security issues fixed:

   - CVE-2018-7537: Fixed catastrophic backtracking in
     django.utils.text.Truncator. (bsc#1083305)
   - CVE-2018-7536: Fixed catastrophic backtracking in urlize and urlizetrunc
     template filters. (bsc#1083304)
   - CVE-2017-12794: Fixed XSS possibility in traceback section of technical
     500 debug page (bsc#1056284)
   - CVE-2017-7234: Open redirect vulnerability in
     django.views.static.serve() (bsc#1031451)
   - CVE-2017-7233: Open redirect and possible XSS attack via user-supplied
     numeric redirect URLs (bsc#1031450)
   - CVE-2016-9014: DNS rebinding vulnerability when DEBUG=True (bsc#1008047)
   - CVE-2016-9013: User with hardcoded password created when running tests
     on Oracle (bsc#1008050)
   - CVE-2016-7401: CSRF protection bypass on a site with Google Analytics
     (bsc#1001374)
   - CVE-2016-2512: Vulnerability in the function tils.http.is_safe_url could
     allow remote users to arbitrary web site and conduct phishing attacks.
     (bsc#bnc#967999)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud 6:

      zypper in -t patch SUSE-OpenStack-Cloud-6-2018-750=1



Package List:

   - SUSE OpenStack Cloud 6 (noarch):

      python-Django-1.8.19-3.6.1


References:

   https://www.suse.com/security/cve/CVE-2016-2512.html
   https://www.suse.com/security/cve/CVE-2016-7401.html
   https://www.suse.com/security/cve/CVE-2016-9013.html
   https://www.suse.com/security/cve/CVE-2016-9014.html
   https://www.suse.com/security/cve/CVE-2017-12794.html
   https://www.suse.com/security/cve/CVE-2017-7233.html
   https://www.suse.com/security/cve/CVE-2017-7234.html
   https://www.suse.com/security/cve/CVE-2018-7536.html
   https://www.suse.com/security/cve/CVE-2018-7537.html
   https://bugzilla.suse.com/1001374
   https://bugzilla.suse.com/1008047
   https://bugzilla.suse.com/1008050
   https://bugzilla.suse.com/1031450
   https://bugzilla.suse.com/1031451
   https://bugzilla.suse.com/1056284
   https://bugzilla.suse.com/1083304
   https://bugzilla.suse.com/1083305
   https://bugzilla.suse.com/967999



More information about the sle-security-updates mailing list