Mageia alert MGASA-2023-0165 (python-django)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2023-0165: Updated python-django packages fix security vulnerability | |
Date: | Tue, 16 May 2023 21:18:45 +0200 | |
Message-ID: | <20230516191845.222509FCFA@duvel.mageia.org> | |
Archive-link: | Article |
MGASA-2023-0165 - Updated python-django packages fix security vulnerability Publication date: 16 May 2023 URL: https://advisories.mageia.org/MGASA-2023-0165.html Type: security Affected Mageia releases: 8 CVE: CVE-2023-24580, CVE-2023-31047 Description: Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack. (CVE-2023-24580) Bypass of validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's "Uploading multiple files" documentation suggested otherwise. (CVE-2023-31047) References: - https://bugs.mageia.org/show_bug.cgi?id=31548 - https://www.djangoproject.com/weblog/2023/feb/14/security... - https://ubuntu.com/security/notices/USN-5868-1 - https://lists.fedoraproject.org/archives/list/package-ann... - https://www.djangoproject.com/weblog/2023/may/03/security... - https://ubuntu.com/security/notices/USN-6054-1 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3... SRPMS: - 8/core/python-django-3.2.18-1.mga8