摘要:
python-django security update
安全等级: High
公告ID: KylinSec-SA-2024-4985
发布日期: 2024年10月18日
关联CVE: CVE-2024-45230 CVE-2024-45231
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.
Security Fix(es):
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.(CVE-2024-45230)
An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).(CVE-2024-45231)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-45230 | V6 | python-django | Fixed |
CVE-2024-45231 | V6 | python-django | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
python-django-help | noarch | 4.2.15-3.ks6 |
python3-Django | noarch | 4.2.15-3.ks6 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名