You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa python-django

Sigurnosni nedostatak programskog paketa python-django

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3089-1
September 27, 2016

python-django vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Django could be made to set arbitrary cookies.

Software Description:
– python-django: High-level Python web development framework

Details:

Sergey Bobrov discovered that Django incorrectly parsed cookies when being
used with Google Analytics. A remote attacker could possibly use this issue
to set arbitrary cookies leading to a CSRF protection bypass.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
python-django 1.8.7-1ubuntu5.2
python3-django 1.8.7-1ubuntu5.2

Ubuntu 14.04 LTS:
python-django 1.6.1-2ubuntu0.15

Ubuntu 12.04 LTS:
python-django 1.3.1-4ubuntu1.21

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3089-1
CVE-2016-7401

Package Information:
https://launchpad.net/ubuntu/+source/python-django/1.8.7-1ubuntu5.2
https://launchpad.net/ubuntu/+source/python-django/1.6.1-2ubuntu0.15
https://launchpad.net/ubuntu/+source/python-django/1.3.1-4ubuntu1.21

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=RJbg
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2016-09-0113-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost programskog paketa jackrabbit

Otkrivena je CSRF ranjivost u programskom paketu jackrabbit za Debian uzrokovana neispravnim provjeravanjem zaglavlja "Content-Type" na HTTP POST zahtjevima. Potencijalni...

Close