--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2020-9c6b391162
2020-09-25 16:31:57.892700
--------------------------------------------------------------------------------
Name : python-django
Product : Fedora 33
Version : 3.0.10
Release : 3.fc33
URL :
https://www.djangoproject.com/
Summary : A high-level Python Web framework
Description :
Django is a high-level Python Web framework that encourages rapid
development and a clean, pragmatic design. It focuses on automating as
much as possible and adhering to the DRY (Don't Repeat Yourself)
principle.
--------------------------------------------------------------------------------
Update Information:
update to 3.0.10, fixes CVE-2020-24583, CVE-2020-24584
--------------------------------------------------------------------------------
ChangeLog:
* Thu Sep 3 2020 Matthias Runge <mrunge(a)redhat.com> - 3.0.10-1
- update to 3.0.10, fixes CVE-2020-24583, CVE-2020-24584
(rhbz#1874487, rhbz#1874494)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1874487 - CVE-2020-24583 python-django: django: incorrect permissions on
intermediate-level directories on Python 3.7+ [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1874487
[ 2 ] Bug #1874494 - CVE-2020-24584 python-django: django: permission escalation in
intermediate-level directories of the file system cache on Python 3.7+ [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1874494
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-9c6b391162' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------