• 公告ID (KylinSec-SA-2024-4985)

摘要:

python-django security update

安全等级: High

公告ID: KylinSec-SA-2024-4985

发布日期: 2024年10月18日

关联CVE: CVE-2024-45230   CVE-2024-45231  

  • 详细介绍

1. 漏洞描述

   

Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Security Fix(es):

An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.(CVE-2024-45230)

An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).(CVE-2024-45231)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-45230 V6 python-django Fixed
CVE-2024-45231 V6 python-django Fixed

3. 影响组件

    python-django

4. 修复版本

   

V6

软件名称 架构 版本号
python-django-help noarch 4.2.15-3.ks6
python3-Django noarch 4.2.15-3.ks6

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

V6:

x86_64:

     python-django-help   

     python3-Django   

aarch64:

     python-django-help   

     python3-Django   

上一篇:KylinSec-SA-2024-4883 下一篇:KylinSec-SA-2024-4034