Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in python-django
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in python-django
ID: MDVSA-2014:179
Distribution: Mandriva
Plattformen: Mandriva Business Server 1.0
Datum: Fr, 5. September 2014, 15:50
Referenzen: http://advisories.mageia.org/MGASA-2014-0366.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0481
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0483
Applikationen: Django

Originalnachricht

This is a multi-part message in MIME format...

------------=_1409922912-11161-4

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:179
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : python-django
Date : September 5, 2014
Affected: Business Server 1.0
_______________________________________________________________________

Problem Description:

Updated python-django packages fix security vulnerabilities:

These releases address an issue with reverse() generating external
URLs (CVE-2014-0480); a denial of service involving file uploads
(CVE-2014-0481); a potential session hijacking issue in the remote-user
middleware (CVE-2014-0482); and a data leak in the administrative
interface (CVE-2014-0483).
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0481
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0483
http://advisories.mageia.org/MGASA-2014-0366.html
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 1/X86_64:
0eca221813ab4acfb3380c7fe0f0654c
mbs1/x86_64/python-django-1.3.7-1.5.mbs1.noarch.rpm
5ca7306fe70ffad78a2eb6cb8908401a
mbs1/SRPMS/python-django-1.3.7-1.5.mbs1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFUCakQmqjQ0CJFipgRApQ7AJwKttjOmRtqdu7cmI5NooVZU573vQCgkCQs
IFC5q31SNiZEHIUQdVmsWLQ=
=1zyf
-----END PGP SIGNATURE-----


------------=_1409922912-11161-4
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1409922912-11161-4--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung