Security update for python-Django1

SUSE Security Update: Security update for python-Django1
Announcement ID: SUSE-SU-2019:2335-1
Rating: important
References: #1136468 #1139945 #1142880 #1142882 #1142883 #1142885
Cross-References: CVE-2019-12308 CVE-2019-12781 CVE-2019-14232 CVE-2019-14233 CVE-2019-14234 CVE-2019-14235
Affected Products:
  • SUSE OpenStack Cloud Crowbar 9
  • SUSE OpenStack Cloud 9

An update that fixes 6 vulnerabilities is now available.


This update for python-Django1 to version 1.11.23 fixes the following issues:

  • CVE-2019-14232: Fixed a denial of service in 'django.utils.text.Truncator' (bsc#1142880).
  • CVE-2019-14233: Fixed a denial of service in strip_tags() (bsc#1142882).
  • CVE-2019-14234: Fixed an SQL injection in key and index lookups for 'JSONField'/'HStoreField' (bsc#1142883).
  • CVE-2019-14235: Fixed a potential memory exhaustion in 'django.utils.encoding.uri_to_iri()' (bsc#1142885).
  • CVE-2019-12781: Fixed incorrect HTTP detection with reverse-proxy connecting via HTTPS (bsc#1139945).
  • CVE-2019-12308: Fixed a cross site scripting vulnerability in the AdminURLFieldWidget (bsc#1136468).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE OpenStack Cloud Crowbar 9:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2019-2335=1
  • SUSE OpenStack Cloud 9:
    zypper in -t patch SUSE-OpenStack-Cloud-9-2019-2335=1

Package List:

  • SUSE OpenStack Cloud Crowbar 9 (noarch):
    • python-Django1-1.11.23-3.9.1
  • SUSE OpenStack Cloud 9 (noarch):
    • python-Django1-1.11.23-3.9.1