Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 23 Dec 2010 18:08:26 +0100
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security <oss-security@...ts.openwall.com>,
        Luke Macken <lmacken@...hat.com>
Subject: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 --
 addressing two security flaws

Hello Steve, vendors,

   Django upstream recently released Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1
versions of Django addressing two security flaws:

   I),   Information leakage in Django administrative interface
   II),  Denial-of-service attack in password-reset mechanism

   References:
   [1] http://www.djangoproject.com/weblog/2010/dec/22/security/
   [2] https://bugzilla.redhat.com/show_bug.cgi?id=665373

Could you allocate CVE ids for these issues?

Thanks && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ