摘要:
python-django security update
安全等级: Critical
公告ID: KylinSec-SA-2024-5000
发布日期: 2025年3月6日
关联CVE: CVE-2024-39329 CVE-2024-39330 CVE-2024-41989 CVE-2024-41990 CVE-2024-41991 CVE-2024-42005
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.
Security Fix(es):
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password.(CVE-2024-39329)
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes of the django.core.files.storage.Storage base class, when they override generate_filename() without replicating the file-path validations from the parent class, potentially allow directory traversal via certain inputs during a save() call. (Built-in Storage sub-classes are unaffected.)(CVE-2024-39330)
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent.(CVE-2024-41989)
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.(CVE-2024-41990)
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.(CVE-2024-41991)
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg.(CVE-2024-42005)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-39329 | V6 | python-django | Fixed |
CVE-2024-39330 | V6 | python-django | Fixed |
CVE-2024-41989 | V6 | python-django | Fixed |
CVE-2024-41990 | V6 | python-django | Fixed |
CVE-2024-41991 | V6 | python-django | Fixed |
CVE-2024-42005 | V6 | python-django | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
python-django-help | noarch | 4.2.15-3.ks6 |
python3-Django | noarch | 4.2.15-3.ks6 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名