Ubuntu 5837-1: Django vulnerability | LinuxSecurity.com
==========================================================================
Ubuntu Security Notice USN-5837-1
February 01, 2023

python-django vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Django could be made to consume memory if it received specially crafted
network traffic.

Software Description:
- python-django: High-level Python web development framework

Details:

Nick Pope discovered that Django incorrectly handled certain
Accept-Language headers. A remote attacker could possibly use this issue to
cause Django to consume memory, leading to a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
   python3-django                  3:3.2.15-1ubuntu1.1

Ubuntu 22.04 LTS:
   python3-django                  2:3.2.12-2ubuntu1.4

Ubuntu 20.04 LTS:
   python3-django                  2:2.2.12-1ubuntu0.15

Ubuntu 18.04 LTS:
   python-django                   1:1.11.11-1ubuntu1.19
   python3-django                  1:1.11.11-1ubuntu1.19

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-5837-1
   CVE-2023-23969

Package Information:
   https://launchpad.net/ubuntu/+source/python-django/3:3.2.15-1ubuntu1.1
   https://launchpad.net/ubuntu/+source/python-django/2:3.2.12-2ubuntu1.4
   https://launchpad.net/ubuntu/+source/python-django/2:2.2.12-1ubuntu0.15
   https://launchpad.net/ubuntu/+source/python-django/1:1.11.11-1ubuntu1.19

Ubuntu 5837-1: Django vulnerability

February 1, 2023
Django could be made to consume memory if it received specially crafted network traffic.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Django could be made to consume memory if it received specially crafted network traffic. Software Description: - python-django: High-level Python web development framework Details: Nick Pope discovered that Django incorrectly handled certain Accept-Language headers. A remote attacker could possibly use this issue to cause Django to consume memory, leading to a denial of service.

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: python3-django 3:3.2.15-1ubuntu1.1 Ubuntu 22.04 LTS: python3-django 2:3.2.12-2ubuntu1.4 Ubuntu 20.04 LTS: python3-django 2:2.2.12-1ubuntu0.15 Ubuntu 18.04 LTS: python-django 1:1.11.11-1ubuntu1.19 python3-django 1:1.11.11-1ubuntu1.19 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5837-1

CVE-2023-23969

Severity
Ubuntu Security Notice USN-5837-1

Package Information

https://launchpad.net/ubuntu/+source/python-django/3:3.2.15-1ubuntu1.1 https://launchpad.net/ubuntu/+source/python-django/2:3.2.12-2ubuntu1.4 https://launchpad.net/ubuntu/+source/python-django/2:2.2.12-1ubuntu0.15 https://launchpad.net/ubuntu/+source/python-django/1:1.11.11-1ubuntu1.19

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.