[Debian] High CVE: CVE-2023-36053/CVE-2023-23969/CVE-2023-24580/CVE-2023-31047 python-django: multiple CVEs

Bug #2030472 reported by Yue Tao
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
StarlingX
Fix Released
High
Wentao Zhang

Bug Description

CVE-2023-36053: https://nvd.nist.gov/vuln/detail/CVE-2023-36053

In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.

CVE-2023-23969: https://nvd.nist.gov/vuln/detail/CVE-2023-23969

In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.

CVE-2023-24580: https://nvd.nist.gov/vuln/detail/CVE-2023-24580

An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.

CVE-2023-31047: https://nvd.nist.gov/vuln/detail/CVE-2023-31047

In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's "Uploading multiple files" documentation suggested otherwise.

Base Score: High

Reference:

['python3-django_2:2.2.28-1~deb11u1_all.deb===>python3-django_2:2.2.28-1~deb11u2_all.deb']
https://www.debian.org/security/2023/dsa-5465
https://www.tenable.com/plugins/nessus/179346

Yue Tao (wrytao)
tags: added: stx.9.0 stx.security
Wentao Zhang (wzhang4)
Changed in starlingx:
assignee: nobody → Wentao Zhang (wzhang4)
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to tools (master)

Fix proposed to branch: master
Review: https://review.opendev.org/c/starlingx/tools/+/891933

Changed in starlingx:
status: Triaged → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to tools (master)

Reviewed: https://review.opendev.org/c/starlingx/tools/+/891933
Committed: https://opendev.org/starlingx/tools/commit/8a6a03eff877634cc5cab74c36a46421e6a2a5af
Submitter: "Zuul (22348)"
Branch: master

commit 8a6a03eff877634cc5cab74c36a46421e6a2a5af
Author: Wentao Zhang <email address hidden>
Date: Tue Aug 22 09:21:12 2023 +0800

    Debian: package : fix CVE-2023-36053/CVE-2023-23969/CVE-2023-24580/CVE-2023-31047

    Upgrade python3-django to 2:2.2.28-1~deb11u2

    Refer to:
    https://nvd.nist.gov/vuln/detail/CVE-2023-36053
    https://nvd.nist.gov/vuln/detail/CVE-2023-23969
    https://nvd.nist.gov/vuln/detail/CVE-2023-24580
    https://nvd.nist.gov/vuln/detail/CVE-2023-31047

    Test Plan:
    Pass: downloader
    Pass: build-pkgs --clean --all
    Pass: build-image
    Pass: boot

    Closes-bug: #2030472

    Signed-off-by: Wentao Zhang <email address hidden>
    Change-Id: I34816384079b1d00352d67eea7194071fd1a61fe

Changed in starlingx:
status: In Progress → Fix Released
Revision history for this message
Ghada Khalil (gkhalil) wrote :

Re-opening.
This change introduced a new issue as reported in https://bugs.launchpad.net/starlingx/+bug/2034379
A revert has been posted: https://review.opendev.org/c/starlingx/tools/+/893960

The original fix will have to be reworked

Changed in starlingx:
status: Fix Released → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to tools (master)

Fix proposed to branch: master
Review: https://review.opendev.org/c/starlingx/tools/+/894257

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to tools (master)

Reviewed: https://review.opendev.org/c/starlingx/tools/+/894257
Committed: https://opendev.org/starlingx/tools/commit/9b147d9e2fe37859ed73d707e390df687dcc7768
Submitter: "Zuul (22348)"
Branch: master

commit 9b147d9e2fe37859ed73d707e390df687dcc7768
Author: Wentao Zhang <email address hidden>
Date: Tue Aug 22 09:21:12 2023 +0800

    Debian: package : fix CVE-2023-36053/CVE-2023-23969/CVE-2023-24580/CVE-2023-31047

    Upgrade python3-django to 2:2.2.28-1~deb11u2

    Refer to:
    https://nvd.nist.gov/vuln/detail/CVE-2023-36053
    https://nvd.nist.gov/vuln/detail/CVE-2023-23969
    https://nvd.nist.gov/vuln/detail/CVE-2023-24580
    https://nvd.nist.gov/vuln/detail/CVE-2023-31047

    Test Plan:
    Pass: downloader
    Pass: build-pkgs --clean --all
    Pass: build-image
    Pass: boot

    Closes-bug: #2030472

    Change-Id: I49bba092ba868eddea6ecf31bb4692f314c5d949
    Signed-off-by: Wentao Zhang <email address hidden>

Changed in starlingx:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.