Security update for python-Django
Announcement ID: | SUSE-SU-2024:0875-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities can now be installed.
Description:
This update for python-Django fixes the following issues:
- CVE-2024-24680: Fixed a denial-of-service in intcomma template filter (bsc#1219683).
- CVE-2024-27351: Fixed potential regular expression denial-of-service in
django.utils.text.Truncator.words()
(bsc#1220358).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
HPE Helion OpenStack 8
zypper in -t patch HPE-Helion-OpenStack-8-2024-875=1
-
SUSE OpenStack Cloud 8
zypper in -t patch SUSE-OpenStack-Cloud-8-2024-875=1
-
SUSE OpenStack Cloud Crowbar 8
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2024-875=1
Package List:
-
HPE Helion OpenStack 8 (noarch)
- python-Django-1.11.29-3.59.3
- venv-openstack-horizon-hpe-x86_64-12.0.5~dev6-14.54.4
-
SUSE OpenStack Cloud 8 (noarch)
- venv-openstack-horizon-x86_64-12.0.5~dev6-14.54.5
- python-Django-1.11.29-3.59.3
-
SUSE OpenStack Cloud Crowbar 8 (noarch)
- python-Django-1.11.29-3.59.3