Summary: | <dev-python/django-{1.4.13,1.5.8,1.6.5}: two vulnerabilities (CVE-2014-{1418,3730}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | python |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B4 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-05-15 07:41:56 UTC
*django-1.4.13 (26 May 2014) *django-1.5.8 (26 May 2014) 26 May 2014; Ian Delaney <idella4@gentoo.org> +django-1.4.13.ebuild, +django-1.5.8.ebuild, -django-1.4.12.ebuild, -django-1.5.6.ebuild, -django-1.5.7.ebuild, -django-1.6.3.ebuild, django-1.6.5.ebuild: bumps; clean of old, excepting the stable -1.4.11, wrt sec. Bug #510382 Arch teams please make stable ALL bumped versions; dev-python/django-1.4.13 django-1.5.8 django-1.6.5 in arches; amd64 x86 (before they release any more) Arches, please test and mark stable: =dev-python/django-1.4.13 =dev-python/django-1.5.8 =dev-python/django-1.6.5 Target Keywords : "amd64 x86" Thank you! amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. Cleanup done. Arches and Mainter(s), Thank you for your work. Added to an existing GLSA request. This issue was resolved and addressed in GLSA 201406-26 at http://security.gentoo.org/glsa/glsa-201406-26.xml by GLSA coordinator Chris Reffett (creffett). CVE-2014-3730 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3730): The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com." CVE-2014-1418 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1418): Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers. |