Security update for python-django

SUSE Security Update: Security update for python-django
Announcement ID: SUSE-SU-2014:1153-1
Rating: moderate
References: #893087 #893088 #893089 #893090
Affected Products:
  • SUSE Cloud 4
  • SUSE Cloud 3

  • An update that fixes four vulnerabilities is now available. It includes one version update.

    Description:


    python-django was updated to 1.5.10 fixing bugs and security issues:

    * Prevented reverse() from generating URLs pointing to other hosts to
    prevent phishing attacks. (bnc#893087, CVE-2014-0480)
    * Removed O(n) algorithm when uploading duplicate file names to fix
    file upload denial of service. (bnc#893088, CVE-2014-0481)
    * Modified RemoteUserMiddleware to logout on REMOTE_USE change to
    prevent session hijacking. (bnc#893089, CVE-2014-0482)
    * Prevented data leakage in contrib.admin via query string
    manipulation. (bnc#893090, CVE-2014-0483)

    Security Issues:

    * CVE-2014-0480

    * CVE-2014-0481

    * CVE-2014-0482

    * CVE-2014-0483

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Cloud 4:
      zypper in -t patch sleclo40sp3-python-django-9684
    • SUSE Cloud 3:
      zypper in -t patch sleclo30sp3-python-django-9685

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Cloud 4 (x86_64) [New Version: 1.5.10]:
      • python-django-1.5.10-0.11.1
    • SUSE Cloud 3 (x86_64) [New Version: 1.5.10]:
      • python-django-1.5.10-0.8.1

    References:

    • http://support.novell.com/security/cve/CVE-2014-0480.html
    • http://support.novell.com/security/cve/CVE-2014-0481.html
    • http://support.novell.com/security/cve/CVE-2014-0482.html
    • http://support.novell.com/security/cve/CVE-2014-0483.html
    • https://bugzilla.suse.com/893087
    • https://bugzilla.suse.com/893088
    • https://bugzilla.suse.com/893089
    • https://bugzilla.suse.com/893090
    • http://download.suse.com/patch/finder/?keywords=24f89316c81f05accc59e0c3f834c0da
    • http://download.suse.com/patch/finder/?keywords=d3ce4da1a86bd6fc9912ef1d22bc8d07