Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.2060 python-django regression update 15 June 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: python-django Publisher: Debian Operating System: Debian GNU/Linux 8 Impact/Access: Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-13254 Reference: ESB-2020.1966 ESB-2020.1962 ESB-2020.1947 Original Bulletin: https://www.debian.org/lts/security/2020/dla-2233-2 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : python-django Version : 1.7.11-1+deb8u10 CVE ID : CVE-2020-13254 It was discovered that there was a regression in the latest update to Django, the Python web development framework. The upstream fix for CVE-2020-13254 to address data leakages via malformed memcached keys could, in some situations, cause a traceback. Please see <https://code.djangoproject.com/ticket/31654> for more information. For Debian 8 "Jessie", this issue has been fixed in python-django version 1.7.11-1+deb8u10. We recommend that you upgrade your python-django packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS Regards, - - -- ,''`. : :' : Chris Lamb `. `'` lamby@debian.org / chris-lamb.co.uk `- - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAl7jWr4ACgkQHpU+J9Qx HlhGtxAAlSy1EDqFKrrdUK52oMhs3yokzn+6t5wm3y+Rx0usp1y6d17tI/16KfOr TYDo8vO0FERwp4reCjuCffHYS0/NMNfwyvoXVnWUavpus5Sci2ZJsj3cUGhGsvRF wcvKezYCYOwjqBm28WIt4fBM4eRLJ5h6H1b7UvwyPIH/8LIZ0LwE9suRrJu63tf/ 5ellaN13XfPTU8Ems/HAyvmEVEaWgi0XshhHGgW7VYPwf/GuRHM9ykZnypAc3uz/ EEPK0nAvDjTuuwpKjFqeub7UyWnuf1REfCOjQZTjOpBVG5RJgnprT5jOxcnYIy1R cvuM/SKPReR8ESwrEMqwIcZw9iEuyg9bC3Et2GjrRImEp9hHhEROcnGzuzSaqqvX 1kz+yAAkoO8VxHDXCRSpPA3fEC9CUvHO6ffbmFjhx1P01xfL/nYhfgkk3lX4WaEi tRytHuIH6StNvGhnnVX5DKriYdotCTSFJqj6a5LNVnuf+lvEBVgtu+LSdyOlNTIF W9Ei4la/J6t01jN21M+MsLrAi59A3wuGWwkmANJTy17Npud821e5c02KkhILf1FQ si3MZOP3CrEeKPys8c06Irj60URWSnmX9QJa+WVk4Afu027yL09eAQba27zy8UTp IMCM0TpHfP1gUeLns9jEY4Rv5jwhf05X6mGfiKKpkrYGg+RRL9k= =GAWP - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXubD2uNLKJtyKPYoAQgzNxAAi4oMi1r70yrUqw46Ki9Eono45qmfYbHA AmsxuVT19JnFG3tYZOcYuSORsUS/i5Ekm8IFq4XzdpziCyo+lUbPX2oGKv6WFIlk Vp7d3u8i9HtGdghSmcWEBDaQj7cTAQnAwGEjVoqnqKdFmcPmiJehsABDQ/TdYM96 YLGnj6T1g3DBk8IgO9ArKlopgADaD9jOfPX8QhGaO9M0zY+iZ265OEChDgoMIRnJ 00UA3n+Ascaq4o0lqmVuDqZve1P4sqYvpzp+BTD8cImP2HhCDqHsKlf2JdLuUNWm dUN9RkesiwFfrSEe8zT3LviDzoHALqB2o+N3X6NirzqqlWWSvhCq7gsSnjrpVuly 7Iw9E89Imuk20udDBaR6Anhs0IHbGwjcdj3oOjQ4UwLCZfQRgOJVxGGtdwWKDA+D N/AAAmuFxEfOUKDT9DWzodbofrbeYZYm0Ph5B1jxt+djbo6YV5qUgZ8afypJNXpP 4LJUTknvEn37nAPWLv+TKXWCraWuOS/hcsORqTL9NRF5oHhanTlw08SnE6EdMjYI W69IwfEm58jzsg133qw9IgHdZFB5M8IWwR1gJUSxR3GC6lH0LGEF2ydZSOANQNE2 Wuq3Zu9ZrzxoUhWzjy/oIqJQkwSy9V/FnnaOQKypiXfXKkjWsZWytUrpCe5O9x2B YVUcVUOOhjM= =PoEf -----END PGP SIGNATURE-----