it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5186-1] djangorestframework security update
- Date: Fri, 22 Jul 2022 12:10:07 +0000
- Authentication-results: mail.piratenpartei.de; dkim=none; dmarc=none; spf=none (mail.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 2001:41b8:202:deb:216:36ff:fe40:4002) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"
- List-archive: https://lists.debian.org/msgid-search/20220722121007.GA3869 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=yEWdKZ6b+3jRA/U6TNn4lA56aVfsBBWsZ6/Trkju6/Q=; b=Ak EAZgPQOEm1cGuoV/ydScRTe1bREjb6/ypapEksABhWL3m25NQMGDwyyC9LxBhpz4wiYqDUrfBYCyg EbhKc5kYbjsf0cG28CJEna1wRp3Ugp4eLPMwZD138KeJjZgtlp3oiTRmiV5WoIrVZJQCYglNaIGK1 C8IjRCWbXFK3d9rw7dyAAPnnna+au0g4k0i4Pn3qs+DA2rt2IOBsx8mIZygW36qlCxkoNIem/Oc8Z qY6Y1ao0eTQooSd/btYLM1vo8kUGZUeSR6zEy8bDxuBZholRDXTQkERT4bt7djywk+3YF50bNvDdJ fwb+7gDhhhWCKCE0QFwcyZBqGMBaJ2MA==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Fri, 22 Jul 2022 13:05:25 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <ngdGgBoFFeN.A.S5G.VCq2iB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5186-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 22, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : djangorestframework
CVE ID : CVE-2020-25626
Two cross-site scripting vulnerabilities were discovered in the Django
Rest Framework, a toolkit to build web APIs.
For the oldstable distribution (buster), this problem has been fixed
in version 3.9.0-1+deb10u1.
The stable distribution (bullseye) is not affected.
We recommend that you upgrade your djangorestframework packages.
For the detailed security status of djangorestframework please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/djangorestframework
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=FBqA
-----END PGP SIGNATURE-----
-
[IT-SecNots] [SECURITY] [DSA 5186-1] djangorestframework security update,
Moritz Muehlenhoff, 22.07.2022
- <Mögliche Wiederholung(en)>
- [IT-SecNots] [SECURITY] [DSA 5186-1] djangorestframework security update, Moritz Muehlenhoff, 22.07.2022
Archiv bereitgestellt durch MHonArc 2.6.24.