Cross-Site Request Forgery in Django
ID: | FEDORA-2016-704e85cac2 |
Distribution: | Fedora |
Plattformen: | Fedora 25 |
Datum: | Mo, 10. Oktober 2016, 23:21 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7401 |
Applikationen: | Django |
Originalnachricht |
|
Name : python-django Product : Fedora 25 Version : 1.9.10 Release : 1.fc25 URL : http://www.djangoproject.com/ Summary : A high-level Python Web framework Description : Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle. -------------------------------------------------------------------------------- Update Information: Security fix for CVE-2016-7401 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1377376 - CVE-2016-7401 python-django: CSRF protection bypass on a site with Google Analytics https://bugzilla.redhat.com/show_bug.cgi?id=1377376 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update python-django' at the command line. For more information, refer to "Managing Software with yum", available at https://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org |