Bug 15528 - python-django new security issues CVE-2015-2241 and CVE-2015-231[67]
Summary: python-django new security issues CVE-2015-2241 and CVE-2015-231[67]
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/637723/
Whiteboard: has_procedure advisory MGA4-32-OK MGA...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-03-19 14:54 CET by David Walser
Modified: 2015-04-03 15:12 CEST (History)
3 users (show)

See Also:
Source RPM: python-django-1.7.3-1.mga5.src.rpm, python-django14-1.4.18-2.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-03-19 14:54:38 CET
Upstream has issued advisories on March 9 and March 18:
https://www.djangoproject.com/weblog/2015/mar/09/security-releases/
https://www.djangoproject.com/weblog/2015/mar/18/security-releases/

The issues are fixed upstream in 1.4.20, 1.7.6, and 1.7.7.

Mageia 4 and Mageia 5 are affected.

Reproducible: 

Steps to Reproduce:
David Walser 2015-03-19 14:54:43 CET

Whiteboard: (none) => MGA5TOO, MGA4TOO

Comment 1 Philippe Makowski 2015-03-19 21:38:56 CET
python-django14-1.4.20-2.mga5 in cauldron core/updates_testing uploaded
python-django-1.7.7-1.mga5 in cauldron core/updates_testing uploaded
python-django-1.5.9-1.2.mga4 in 4 core/updates_testing uploaded
python-django14-1.4.20-1.mga4 in 4 core/updates_testing uploaded
Philippe Makowski 2015-03-19 21:48:37 CET

Assignee: makowski.mageia => qa-bugs

Comment 2 David Walser 2015-03-19 21:49:46 CET
Thanks Philippe!

We'll also need either to bump the release tags in Cauldron and ask for a freeze push, or just ask for the sysadmins to move the packages from core/updates_testing to core/release.

CC: (none) => makowski.mageia

Comment 3 David Walser 2015-03-19 21:53:37 CET
Assigning back to Philippe for now until these are pushed in Cauldron.

CC: (none) => qa-bugs
Assignee: qa-bugs => makowski.mageia

Comment 4 David Walser 2015-03-20 17:48:37 CET
python-django-1.7.7-2.mga5 and python-django14-1.4.20-3.mga5 uploaded for Cauldron.

Assigning the Mageia 4 update to QA.  Advisory to come later.

Version: Cauldron => 4
Whiteboard: MGA5TOO, MGA4TOO => (none)

Comment 5 David Walser 2015-03-20 18:08:42 CET
Testing procedure:
https://bugs.mageia.org/show_bug.cgi?id=13251#c6

Advisory:
========================

Updated python-django and python-django14 packages fix security
vulnerabilities:

The ModelAdmin.readonly_fields attribute in the Django admin allows
displaying model fields and model attributes. While the former were correctly
escaped, the latter were not. Thus untrusted content could be injected into
the admin, presenting an exploitation vector for XSS attacks (CVE-2015-2241).

Django relies on user input in some cases to redirect the user to an "on
success" URL. The security checks for these redirects accepted URLs with
leading control characters and so considered URLs like \x08javascript:...
safe. This issue doesn't affect Django currently, however, if a developer
relies on is_safe_url() to provide safe redirect targets and puts such a URL
into a link, they could suffer from an XSS attack as some browsers such as
Google Chrome ignore control characters at the start of a URL in an anchor
href (CVE-2015-2317).

Note that the CVE-2015-2241 issue does not affect python-django14 directly,
but client code using it may be affected.  Please see the March 9th upstream
advisory for more information on this.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2241
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2316
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2317
https://www.djangoproject.com/weblog/2015/mar/09/security-releases/
https://www.djangoproject.com/weblog/2015/mar/18/security-releases/
========================

Updated packages in core/updates_testing:
========================
python-django14-1.4.20-1.mga4
python-django-1.5.9-1.2.mga4
python3-django-1.5.9-1.2.mga4
python-django-doc-1.5.9-1.2.mga4

from SRPMS:
python-django14-1.4.20-1.mga4.src.rpm
python-django-1.5.9-1.2.mga4.src.rpm

Whiteboard: (none) => has_procedure

Comment 6 David Walser 2015-03-20 19:11:03 CET
Oops, forgot to assign back to QA.  See Comment 5.

CC: qa-bugs => (none)
Assignee: makowski.mageia => qa-bugs

Comment 7 David Walser 2015-03-24 18:01:47 CET
Ubuntu has issued an advisory for this on March 23:
http://www.ubuntu.com/usn/usn-2539-1/

URL: (none) => http://lwn.net/Vulnerabilities/637723/

Comment 8 David Walser 2015-03-30 15:20:54 CEST
LWN reference for CVE-2015-2241:
http://lwn.net/Vulnerabilities/638309/
Comment 9 olivier charles 2015-03-31 20:22:26 CEST
Testing on Mageia4x32, real hardware, using procedure mentioned in comment 5

From current packages :
---------------------

python-django14-1.4.18-1.1.mga4
python-django-1.5.9-1.1.mga4
python3-django-1.5.9-1.1.mga4

With each python-django version, launched the server and verified browsing to :
http://localhost:8000/ that it was working.

To updated testing packages :
---------------------------

python-django14-1.4.20-1.mga4
python-django-1.5.9-1.2.mga4
python3-django-1.5.9-1.2.mga4

Same procedure.

All OK

CC: (none) => olchal
Whiteboard: has_procedure => has_procedure MGA4-32-OK

Comment 10 olivier charles 2015-04-02 20:59:58 CEST
Testing on Mageia4x64 real hardware using same procedure

From current packages :
---------------------
python-django14-1.4.18-1.1.mga4
python-django-1.5.9-1.1.mga4
python3-django-1.5.9-1.1.mga4

To udpadted testing packages :
----------------------------
python-django14-1.4.20-1.mga4
python-django-1.5.9-1.2.mga4
python3-django-1.5.9-1.2.mga4

With each python-django version, launched the server and verified browsing to :
http://localhost:8000/ that it was working.

OK

Whiteboard: has_procedure MGA4-32-OK => has_procedure MGA4-32-OK MGA4-64-OK

Comment 11 claire robinson 2015-04-03 13:48:34 CEST
Validating. Advisory uploaded.

Please push to 4 updates

Thanks

Keywords: (none) => validated_update
Whiteboard: has_procedure MGA4-32-OK MGA4-64-OK => has_procedure advisory MGA4-32-OK MGA4-64-OK
CC: (none) => sysadmin-bugs

Comment 12 Mageia Robot 2015-04-03 15:12:05 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0127.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.