it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5186-1] djangorestframework security update
- Date: Fri, 22 Jul 2022 13:01:21 +0000
- Authentication-results: mail.piratenpartei.de; dkim=none; dmarc=none; spf=none (mail.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 2001:41b8:202:deb:216:36ff:fe40:4002) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"
- List-archive: https://lists.debian.org/msgid-search/20220722130121.GA31881 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=yEWdKZ6b+3jRA/U6TNn4lA56aVfsBBWsZ6/Trkju6/Q=; b=cO Vak6EJ9aWXPHpvcxNekMCsPDO1hENWX5tVQjp/TZ0CB94Qv3ahlfRVEods3sy3LbD02yXMxAxMit+ KNzwCgCZO6hiuFpU8PtyibutDJ0BdZXb6sgkfrF94xHWKqMGJLwXrJPuqEPRF8vUl4kuml4gUhVei LuGwMrmbuNcshRzYVW8Cud5MpQ5/56m0J1X4qXEp93fKJ6hD/wW49gBj7XNCETl9ZKFlGxGhii6x5 B1hgIH4SvqCHjp02id2vTChRvpZ5W/LGpDhVXBKtmw/pie2XfmqdKhv7UxInedIvkb/lMLShLz+oC moSSN4oae05twsouGAc6N/XTQ8U6W98Q==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Fri, 22 Jul 2022 13:09:52 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <0MXTMl4_ztE.A.TmD.gGq2iB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5186-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 22, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : djangorestframework
CVE ID : CVE-2020-25626
Two cross-site scripting vulnerabilities were discovered in the Django
Rest Framework, a toolkit to build web APIs.
For the oldstable distribution (buster), this problem has been fixed
in version 3.9.0-1+deb10u1.
The stable distribution (bullseye) is not affected.
We recommend that you upgrade your djangorestframework packages.
For the detailed security status of djangorestframework please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/djangorestframework
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=FBqA
-----END PGP SIGNATURE-----
-
[IT-SecNots] [SECURITY] [DSA 5186-1] djangorestframework security update,
Moritz Muehlenhoff, 22.07.2022
- <Mögliche Wiederholung(en)>
- [IT-SecNots] [SECURITY] [DSA 5186-1] djangorestframework security update, Moritz Muehlenhoff, 22.07.2022
Archiv bereitgestellt durch MHonArc 2.6.24.