-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat OpenStack Platform 16.1.4 (python-django) security update
Advisory ID:       RHSA-2021:0915-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0915
Issue date:        2021-03-17
CVE Names:         CVE-2020-13254 
====================================================================
1. Summary:

An update for python-django is now available for Red Hat OpenStack Platform
16.1 (Train).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 16.1 - noarch

3. Description:

Django is a high-level Python Web framework that encourages rapid
development and a clean, pragmatic design. It focuses on automating as much
as possible and adhering to the DRY (Don't Repeat Yourself) principle.

Security Fix(es):

* potential data leakage via malformed memcached keys (CVE-2020-13254)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1843614 - CVE-2020-13254 django: potential data leakage via malformed memcached keys
1919306 - [FFU 13->16.1] Overcloud FFU converge fails while trying to start haproxy pcs resource

6. Package List:

Red Hat OpenStack Platform 16.1:

Source:
python-django20-2.0.13-12.el8ost.src.rpm

noarch:
python-django20-bash-completion-2.0.13-12.el8ost.noarch.rpm
python3-django20-2.0.13-12.el8ost.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-13254
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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7IVA
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-0915:01 Moderate: Red Hat OpenStack Platform 16.1.4

An update for python-django is now available for Red Hat OpenStack Platform 16.1 (Train)

Summary

Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle.
Security Fix(es):
* potential data leakage via malformed memcached keys (CVE-2020-13254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2020-13254 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat OpenStack Platform 16.1:
Source: python-django20-2.0.13-12.el8ost.src.rpm
noarch: python-django20-bash-completion-2.0.13-12.el8ost.noarch.rpm python3-django20-2.0.13-12.el8ost.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2021:0915-01
Product: Red Hat OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0915
Issued Date: : 2021-03-17
CVE Names: CVE-2020-13254

Topic

An update for python-django is now available for Red Hat OpenStack Platform16.1 (Train).Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat OpenStack Platform 16.1 - noarch


Bugs Fixed

1843614 - CVE-2020-13254 django: potential data leakage via malformed memcached keys

1919306 - [FFU 13->16.1] Overcloud FFU converge fails while trying to start haproxy pcs resource


Related News