SUSE alert openSUSE-SU-2023:0390-1 (python-Django1)
From: | opensuse-security@opensuse.org | |
To: | security-announce@lists.opensuse.org | |
Subject: | openSUSE-SU-2023:0390-1: moderate: Security update for python-Django1 | |
Date: | Mon, 04 Dec 2023 21:04:52 +0100 | |
Message-ID: | <20231204200452.43658FBA9@maintenance.suse.de> | |
Archive-link: | Article |
openSUSE Security Update: Security update for python-Django1 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2023:0390-1 Rating: moderate References: #1215978 Cross-References: CVE-2023-43665 CVSS scores: CVE-2023-43665 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2023-43665 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: openSUSE Backports SLE-15-SP5 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for python-Django1 fixes the following issues: - CVE-2023-43665: Fixed Denial-of-service vulnerability in django.utils.text.Truncator (boo#1215978). Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2023-390=1 Package List: - openSUSE Backports SLE-15-SP5 (noarch): python3-Django1-1.11.29-bp155.4.6.1 References: https://www.suse.com/security/cve/CVE-2023-43665.html https://bugzilla.suse.com/1215978