First published: Wed Dec 04 2024(Updated: )
USN-7136-1 fixed a vulnerability in Django. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: jiangniao discovered that Django incorrectly handled the API to strip tags. A remote attacker could possibly use this issue to cause Django to consume resources, leading to a denial of service. (CVE-2024-53907) Seokchan Yoon discovered that Django incorrectly handled HasKey lookups when using Oracle. A remote attacker could possibly use this issue to inject arbitrary SQL code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-53908)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python-django | <1:1.11.11-1ubuntu1.21+esm8 | 1:1.11.11-1ubuntu1.21+esm8 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/python3-django | <1:1.11.11-1ubuntu1.21+esm8 | 1:1.11.11-1ubuntu1.21+esm8 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/python-django | <1.8.7-1ubuntu5.15+esm8 | 1.8.7-1ubuntu5.15+esm8 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/python3-django | <1.8.7-1ubuntu5.15+esm8 | 1.8.7-1ubuntu5.15+esm8 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.