Lucene search

K
gentooGentoo FoundationGLSA-201412-22
HistoryDec 13, 2014 - 12:00 a.m.

Django: Multiple vulnerabilities

2014-12-1300:00:00
Gentoo Foundation
security.gentoo.org
15

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.032 Low

EPSS

Percentile

90.9%

Background

Django is a Python-based web framework.

Description

Multiple vulnerabilities have been discovered in Django. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker may be able to create a Denial of Service condition, obtain sensitive information, or hijack web sessions.

Workaround

There is no known workaround at this time.

Resolution

All Django 1.6 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/django-1.6.7"

All Django 1.5 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/django-1.5.10"

All Django 1.4 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/django-1.4.15"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-python/django< 1.6.7UNKNOWN

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.032 Low

EPSS

Percentile

90.9%