Search results
Search results
Mandriva security update to python-django
([Security]
Posted Dec 9, 2009 18:59 UTC (Wed)
by jake )
-2009:276-1 ] python-django Date : Tue, 08 Dec 2009 23:07:01 +0100 Message-ID : <E1NI8Cz-0002kM-Iv@titan.mandriva.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2009:276-1 http://www.mandriva.com/security/ _______________________________________________________________________ Package : python-django Date : December 8, 2009 Affected: 2008.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been found and corrected in python-django: The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected static media files, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL (CVE-2009-2659). Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression (CVE-2009-3695
Mandriva security update to python-django
([Security]
Posted Oct 13, 2009 17:50 UTC (Tue)
by ris )
-2009:276 ] python-django Date : Tue, 13 Oct 2009 19:09:02 +0200 Message-ID : <E1Mxkru-0001qu-Pm@titan.mandriva.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2009:276 http://www.mandriva.com/security/ _______________________________________________________________________ Package : python-django Date : October 13, 2009 Affected: 2009.0, 2009.1, Enterprise Server 5.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been found and corrected in python-django: The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected static media files, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL (CVE-2009-2659). Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression (CVE-2009-3695