Ubuntu 1967-1: Django vulnerabilities

    Date24 Sep 2013
    Posted ByLinuxSecurity Advisories
    Several security issues were fixed in Django.
    Ubuntu Security Notice USN-1967-1
    September 24, 2013
    python-django vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 13.04
    - Ubuntu 12.10
    - Ubuntu 12.04 LTS
    - Ubuntu 10.04 LTS
    Several security issues were fixed in Django.
    Software Description:
    - python-django: High-level Python web development framework
    It was discovered that Django incorrectly handled large passwords. A remote
    attacker could use this issue to consume resources, resulting in a denial
    of service. (CVE-2013-1443)
    It was discovered that Django incorrectly handled ssi templates. An
    attacker could use this issue to read arbitrary files. (CVE-2013-4315)
    It was discovered that the Django is_safe_url utility function did not
    restrict redirects to certain schemes. An attacker could possibly use this
    issue to perform a cross-site scripting attack.
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 13.04:
      python-django                   1.4.5-1ubuntu0.1
    Ubuntu 12.10:
      python-django                   1.4.1-2ubuntu0.4
    Ubuntu 12.04 LTS:
      python-django                   1.3.1-4ubuntu1.8
    Ubuntu 10.04 LTS:
      python-django                   1.1.1-2ubuntu1.9
    In general, a standard system update will make all the necessary changes.
      CVE-2013-1443, CVE-2013-4315
    Package Information:

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"90","title":"Love them!","votes":"94","type":"x","order":"1","pct":79.66,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"18","type":"x","order":"2","pct":15.25,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"6","type":"x","order":"3","pct":5.08,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.