[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1KazJc-0000lI-FO@titan.mandriva.com>
Date: Wed, 03 Sep 2008 14:51:00 -0600
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2008:185 ] python-django
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:185
http://www.mandriva.com/security/
_______________________________________________________________________
Package : python-django
Date : September 3, 2008
Affected: 2007.1, 2008.0, 2008.1
_______________________________________________________________________
Problem Description:
A cross-site request forgery vulnerability was discovered in Django
that, if exploited, could be used to perform unrequested deletion or
modification of data. Updated versions of Django will now discard
posts from users whose sessions have expired, so data will need to
be re-entered in these cases.
The versions of Django shipping with Mandriva Linux have been updated
to the latest patched versions that include the fix for this issue.
In addition, they provide other bug fixes.
_______________________________________________________________________
References:
http://www.djangoproject.com/weblog/2008/sep/02/security/
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.1:
38edd5a0e5521c3c1acfd19e51875ea9 2007.1/i586/python-django-0.95.4-0.1mdv2007.1.noarch.rpm
0380a1637f0796008dcd5c29a9c78182 2007.1/SRPMS/python-django-0.95.4-0.1mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
5b96616e028855ff7e5afa8f5c583c01 2007.1/x86_64/python-django-0.95.4-0.1mdv2007.1.noarch.rpm
0380a1637f0796008dcd5c29a9c78182 2007.1/SRPMS/python-django-0.95.4-0.1mdv2007.1.src.rpm
Mandriva Linux 2008.0:
b44c60bcbdfd6ae99460fabd6de4cffd 2008.0/i586/python-django-0.96.3-0.1mdv2008.0.noarch.rpm
ab14397d32e097129323453dc3fea45f 2008.0/SRPMS/python-django-0.96.3-0.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
0edf0f10f8f23c326e97136ee2f53771 2008.0/x86_64/python-django-0.96.3-0.1mdv2008.0.noarch.rpm
ab14397d32e097129323453dc3fea45f 2008.0/SRPMS/python-django-0.96.3-0.1mdv2008.0.src.rpm
Mandriva Linux 2008.1:
30efe5a9d7c66921dac5f7240b803728 2008.1/i586/python-django-0.96.3-0.1mdv2008.1.noarch.rpm
9f7363e6176cf979043fc514bde04697 2008.1/SRPMS/python-django-0.96.3-0.1mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64:
7387677bee02518fa5ef9086b4bbf48b 2008.1/x86_64/python-django-0.96.3-0.1mdv2008.1.noarch.rpm
9f7363e6176cf979043fc514bde04697 2008.1/SRPMS/python-django-0.96.3-0.1mdv2008.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFIvss9mqjQ0CJFipgRApXgAJ9E6UrB1O4xV2D86+2RlZhS1mhcVACgtbR3
HR8hGgsIZiYSS0cMszhWCx8=
=zGMS
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists