• [SECURITY] [DSA 5186-1] djangorestframework security update

    From Moritz Muehlenhoff@21:1/5 to All on Fri Jul 22 15:10:02 2022
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-5186-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff
    July 22, 2022 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : djangorestframework
    CVE ID : CVE-2020-25626

    Two cross-site scripting vulnerabilities were discovered in the Django
    Rest Framework, a toolkit to build web APIs.

    For the oldstable distribution (buster), this problem has been fixed
    in version 3.9.0-1+deb10u1.

    The stable distribution (bullseye) is not affected.

    We recommend that you upgrade your djangorestframework packages.

    For the detailed security status of djangorestframework please refer to
    its security tracker page at: https://security-tracker.debian.org/tracker/djangorestframework

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmLakOcACgkQEMKTtsN8 TjaU5Q//fyTuYiLROh6G8ET1G/g/f4Zb6byeeGppyw0K0hvFlostDOvdwenEGIco p2yrk6K3n/86LJYvOVuF1+uqxPPxYBdC5X7LH2Cp+kZ9CVz/3qOEmza2eFBwq4w5 h1UQF409PMIF/Vwnbj+QjwGzCRe8hPXJnXsx7ztaIOzYQedebk9Rq+ykRdpz5tdu hPQUVG7oTAVCjQA4OOb0XW4Gxi4hGRbX3y4UXbZeiiDQtBOTNxzm3qH4kFKyHnt6 HAK7Jef/GgcDvG+0yBKEGOIaZrS1GpQqirp2OX68Lk9ZePJLEdiTgmNoTh93AzY3 68QnHUZvDeXAzxYwWfRmad2cloaEnCtLZRUQxrgRdSimCtVkP3SWJEZd3GzF2nTa n3byzMlKK8cKdAG3AT0IUaxL4UNCq8yJWbZVMFOf5/sErelxu9PEJrAhsJc+U7cr JJiKxsHEua7t6UJWHHYT5Xb00L/d10Y/AXWm2WEaGwnBjQ25NY7ZXFvxV6YqiohE 7NKa4eFaFhWTemltlDJ+l+oZU2NZTtfPoCkFAEXcZ6PDIBbHi2ryivajX4Ty2x1b JuWUFcof24Az5jsxpaZ/Y0FiXT5Pxd+8ZODg+hXm1X1BwV4cRBfsmt7a5vQMnlMr MJec+BUCGRxX0njoHab+Wrvh4Ipa+GpHU8wgiaZO6K0jA6HTTAM=
    =FBqA
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Moritz Muehlenhoff@21:1/5 to All on Fri Jul 22 15:20:01 2022
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-5186-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff
    July 22, 2022 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : djangorestframework
    CVE ID : CVE-2020-25626

    Two cross-site scripting vulnerabilities were discovered in the Django
    Rest Framework, a toolkit to build web APIs.

    For the oldstable distribution (buster), this problem has been fixed
    in version 3.9.0-1+deb10u1.

    The stable distribution (bullseye) is not affected.

    We recommend that you upgrade your djangorestframework packages.

    For the detailed security status of djangorestframework please refer to
    its security tracker page at: https://security-tracker.debian.org/tracker/djangorestframework

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmLakOcACgkQEMKTtsN8 TjaU5Q//fyTuYiLROh6G8ET1G/g/f4Zb6byeeGppyw0K0hvFlostDOvdwenEGIco p2yrk6K3n/86LJYvOVuF1+uqxPPxYBdC5X7LH2Cp+kZ9CVz/3qOEmza2eFBwq4w5 h1UQF409PMIF/Vwnbj+QjwGzCRe8hPXJnXsx7ztaIOzYQedebk9Rq+ykRdpz5tdu hPQUVG7oTAVCjQA4OOb0XW4Gxi4hGRbX3y4UXbZeiiDQtBOTNxzm3qH4kFKyHnt6 HAK7Jef/GgcDvG+0yBKEGOIaZrS1GpQqirp2OX68Lk9ZePJLEdiTgmNoTh93AzY3 68QnHUZvDeXAzxYwWfRmad2cloaEnCtLZRUQxrgRdSimCtVkP3SWJEZd3GzF2nTa n3byzMlKK8cKdAG3AT0IUaxL4UNCq8yJWbZVMFOf5/sErelxu9PEJrAhsJc+U7cr JJiKxsHEua7t6UJWHHYT5Xb00L/d10Y/AXWm2WEaGwnBjQ25NY7ZXFvxV6YqiohE 7NKa4eFaFhWTemltlDJ+l+oZU2NZTtfPoCkFAEXcZ6PDIBbHi2ryivajX4Ty2x1b JuWUFcof24Az5jsxpaZ/Y0FiXT5Pxd+8ZODg+hXm1X1BwV4cRBfsmt7a5vQMnlMr MJec+BUCGRxX0njoHab+Wrvh4Ipa+GpHU8wgiaZO6K0jA6HTTAM=
    =FBqA
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)