Updated python-django and python-django14 packages fix security vulnerabilities
Publication date: 17 Jan 2015Modification date: 17 Jan 2015
Type: security
Affected Mageia releases : 4
CVE: CVE-2015-0219 , CVE-2015-0220 , CVE-2015-0221 , CVE-2015-0222
Description
Jedediah Smith discovered that Django incorrectly handled underscores in WSGI headers. A remote attacker could possibly use this issue to spoof headers in certain environments (CVE-2015-0219). Mikko Ohtamaa discovered that Django incorrectly handled user-supplied redirect URLs. A remote attacker could possibly use this issue to perform a cross-site scripting attack (CVE-2015-0220). Alex Gaynor discovered that Django incorrectly handled reading files in django.views.static.serve(). A remote attacker could possibly use this issue to cause Django to consume resources, resulting in a denial of service (CVE-2015-0221). Keryn Knight discovered that Django incorrectly handled forms with ModelMultipleChoiceField. A remote attacker could possibly use this issue to cause a large number of SQL queries, resulting in a database denial of service. Note that this issue only affected python-django (CVE-2015-0222).
References
- https://bugs.mageia.org/show_bug.cgi?id=15045
- https://www.djangoproject.com/weblog/2015/jan/13/security/
- http://www.ubuntu.com/usn/usn-2469-1/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0219
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0220
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0221
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0222
SRPMS
4/core
- python-django14-1.4.18-1.1.mga4
- python-django-1.5.9-1.1.mga4