|
|
Subscribe / Log in / New account

Ubuntu alert USN-6203-1 (python-django)

From:  Marc Deslauriers <marc.deslauriers@canonical.com>
To:  "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com>
Subject:  [USN-6203-1] Django vulnerability
Date:  Wed, 05 Jul 2023 09:32:58 -0400
Message-ID:  <6745a16f-169e-cf8d-5381-b031b97aa436@canonical.com>

========================================================================== Ubuntu Security Notice USN-6203-1 July 05, 2023 python-django vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.04 - Ubuntu 22.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Django could be made to consume resources if it received specially crafted network traffic. Software Description: - python-django: High-level Python web development framework Details: Seokchan Yoon discovered that Django incorrectly handled certain regular expressions. A remote attacker could possibly use this issue to cause Django to consume resources, leading to a denial of service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.04: python3-django 3:3.2.18-1ubuntu0.3 Ubuntu 22.10: python3-django 3:3.2.15-1ubuntu1.4 Ubuntu 22.04 LTS: python3-django 2:3.2.12-2ubuntu1.7 Ubuntu 20.04 LTS: python3-django 2:2.2.12-1ubuntu0.18 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6203-1 CVE-2023-36053 Package Information: https://launchpad.net/ubuntu/+source/python-django/3:3.2.... https://launchpad.net/ubuntu/+source/python-django/3:3.2.... https://launchpad.net/ubuntu/+source/python-django/2:3.2.... https://launchpad.net/ubuntu/+source/python-django/2:2.2....


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds