Otkrivena su i ispravljena tri sigurnosna propusta programskog paketa Django. Spomenuti propusti omogućuju udaljenom zlonamjernom korisniku izvođenje DoS (eng. Denial of service) i XSS (eng. Cross-site scripting) napada.
Paket:
django 1.x
Operacijski sustavi:
Fedora 16, Fedora 17
Problem:
pogreška u programskoj funkciji, pogreška u programskoj komponenti
Propusti su posljedica pogrešaka u funkciji "get_image_dimensions" te klasama "django.forms.ImageField", "django.http.HttpResponseRedirect" i "django.http.HttpResponsePermanentRedirect".
Posljedica:
Nedostatke je moguće iskoristiti za DoS i XSS napade.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-11415
2012-08-02 10:51:35
--------------------------------------------------------------------------------
Name : Django
Product : Fedora 17
Version : 1.4.1
Release : 1.fc17
URL : http://www.djangoproject.com/
Summary : A high-level Python Web framework
Description :
Django is a high-level Python Web framework that encourages rapid
development and a clean, pragmatic design. It focuses on automating as
much as possible and adhering to the DRY (Don't Repeat Yourself)
principle.
--------------------------------------------------------------------------------
Update Information:
security release
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/
--------------------------------------------------------------------------------
ChangeLog:
* Wed Aug 1 2012 Alan Pevec <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.4.1-1
- security release
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/
fixes CVE-2012-3442 CVE-2012-3443 CVE-2012-3444
* Wed May 30 2012 Matthias Runge <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4-3
- fix for FTBFS using python 2.7.3 (thanks to M.Cepl)
* Sun Apr 1 2012 Matthias Runge <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4-2
- include forgotten %bcond_with internet
- fix language handling for el6
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #844518 - CVE-2012-3442 Django: 1.3.1 and 1.4.0 Cross-site scripting
in authentication views
https://bugzilla.redhat.com/show_bug.cgi?id=844518
[ 2 ] Bug #844522 - CVE-2012-3443 Django: 1.3.1 and 1.4.0 Denial-of-service in
image validation
https://bugzilla.redhat.com/show_bug.cgi?id=844522
[ 3 ] Bug #844526 - CVE-2012-3444 Django: 1.3.1 and 1.4.0 Denial-of-service
via get_image_dimensions()
https://bugzilla.redhat.com/show_bug.cgi?id=844526
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update Django' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-11416
2012-08-02 10:51:38
--------------------------------------------------------------------------------
Name : Django
Product : Fedora 16
Version : 1.3.2
Release : 1.fc16
URL : http://www.djangoproject.com/
Summary : A high-level Python Web framework
Description :
Django is a high-level Python Web framework that encourages rapid
development and a clean, pragmatic design. It focuses on automating as
much as possible and adhering to the DRY (Don't Repeat Yourself)
principle.
--------------------------------------------------------------------------------
Update Information:
security release
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/
--------------------------------------------------------------------------------
ChangeLog:
* Mon Jul 30 2012 Alan Pevec <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.3.2-1
- security release
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/
fixes CVE-2012-3442 CVE-2012-3443 CVE-2012-3444
* Wed Oct 12 2011 Michel Salim <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.3.1-3
- Package bash completion script
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #844518 - CVE-2012-3442 Django: 1.3.1 and 1.4.0 Cross-site scripting
in authentication views
https://bugzilla.redhat.com/show_bug.cgi?id=844518
[ 2 ] Bug #844522 - CVE-2012-3443 Django: 1.3.1 and 1.4.0 Denial-of-service in
image validation
https://bugzilla.redhat.com/show_bug.cgi?id=844522
[ 3 ] Bug #844526 - CVE-2012-3444 Django: 1.3.1 and 1.4.0 Denial-of-service
via get_image_dimensions()
https://bugzilla.redhat.com/show_bug.cgi?id=844526
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update Django' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke