Ubuntu 1297-1: Django vulnerabilities

    Date08 Dec 2011
    Posted ByLinuxSecurity Advisories
    Applications using Django could be made to crash or expose sensitive information.
    Ubuntu Security Notice USN-1297-1
    December 09, 2011
    python-django vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 11.10
    - Ubuntu 11.04
    - Ubuntu 10.10
    - Ubuntu 10.04 LTS
    Applications using Django could be made to crash or expose sensitive
    Software Description:
    - python-django: High-level Python web development framework
    Pall McMillan discovered that Django used the root namespace when storing
    cached session data. A remote attacker could exploit this to modify
    sessions. (CVE-2011-4136)
    Paul McMillan discovered that Django would not timeout on arbitrary URLs
    when the application used URLFields. This could be exploited by a remote
    attacker to cause a denial of service via resource exhaustion.
    Paul McMillan discovered that while Django would check the validity of a
    URL via a HEAD request, it would instead use a GET request for the target
    of a redirect. This could potentially be used to trigger arbitrary GET
    requests via a crafted Location header. (CVE-2011-4138)
    It was discovered that Django would sometimes use a request's HTTP Host
    header to construct a full URL. A remote attacker could exploit this to
    conduct host header cache poisoning attacks via a crafted request.
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 11.10:
      python-django                   1.3-2ubuntu1.1
    Ubuntu 11.04:
      python-django                   1.2.5-1ubuntu1.1
    Ubuntu 10.10:
      python-django                   1.2.3-1ubuntu0.
    Ubuntu 10.04 LTS:
      python-django                   1.1.1-2ubuntu1.4
    In general, a standard system update will make all the necessary changes.
      CVE-2011-4136, CVE-2011-4137, CVE-2011-4138, CVE-2011-4139
    Package Information:
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"90","title":"Love them!","votes":"35","type":"x","order":"1","pct":92.11,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"2","type":"x","order":"2","pct":5.26,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"1","type":"x","order":"3","pct":2.63,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.