ALT Vulnerability

This commit is contained in:
Иван Пепеляев 2024-03-16 09:03:43 +00:00
parent 38f46249af
commit 8b9ae8bcbb
2 changed files with 14 additions and 2 deletions

View File

@ -50,7 +50,7 @@
"Source": "CVE"
}
],
"Description": "This update upgrades python3-module-django to version 3.2.25-alt1. \nSecurity Fix(es):\n\n * BDU:2023-08741: Уязвимость программной платформы для веб-приложений Django, связанная c неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании (DoS)\n\n * BDU:2024-01517: Уязвимость программной платформы для веб-приложений Django, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2023-46695: An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.\n\n * CVE-2024-24680: An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.\n\n * CVE-2024-27351: description unavailable",
"Description": "This update upgrades python3-module-django to version 3.2.25-alt1. \nSecurity Fix(es):\n\n * BDU:2023-08741: Уязвимость программной платформы для веб-приложений Django, связанная c неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании (DoS)\n\n * BDU:2024-01517: Уязвимость программной платформы для веб-приложений Django, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2023-46695: An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.\n\n * CVE-2024-24680: An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.\n\n * CVE-2024-27351: In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
@ -97,6 +97,12 @@
"Impact": "High",
"Public": "20240206",
"CveID": "CVE-2024-24680"
},
{
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-27351",
"Impact": "None",
"Public": "20240315",
"CveID": "CVE-2024-27351"
}
],
"AffectedCpeList": {

View File

@ -46,7 +46,7 @@
"Source": "CVE"
}
],
"Description": "This update upgrades python3-module-django to version 3.2.25-alt1. \nSecurity Fix(es):\n\n * BDU:2023-08741: Уязвимость программной платформы для веб-приложений Django, связанная c неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании (DoS)\n\n * BDU:2024-01517: Уязвимость программной платформы для веб-приложений Django, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2023-46695: An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.\n\n * CVE-2024-24680: An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.\n\n * CVE-2024-27351: description unavailable",
"Description": "This update upgrades python3-module-django to version 3.2.25-alt1. \nSecurity Fix(es):\n\n * BDU:2023-08741: Уязвимость программной платформы для веб-приложений Django, связанная c неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании (DoS)\n\n * BDU:2024-01517: Уязвимость программной платформы для веб-приложений Django, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2023-46695: An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.\n\n * CVE-2024-24680: An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.\n\n * CVE-2024-27351: In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
@ -93,6 +93,12 @@
"Impact": "High",
"Public": "20240206",
"CveID": "CVE-2024-24680"
},
{
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-27351",
"Impact": "None",
"Public": "20240315",
"CveID": "CVE-2024-27351"
}
],
"AffectedCpeList": {