From 583dd6a97bf2727e6e8d8bf4bbceb70e3c271a14 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Mon, 18 Jul 2016 21:37:28 +0000 Subject: [DSA 3622-1] python-django security update CVS version numbers english/security/2016/dsa-3622.data: INITIAL -> 1.1 english/security/2016/dsa-3622.wml: INITIAL -> 1.1 --- english/security/2016/dsa-3622.data | 13 +++++++++++++ english/security/2016/dsa-3622.wml | 15 +++++++++++++++ 2 files changed, 28 insertions(+) create mode 100644 english/security/2016/dsa-3622.data create mode 100644 english/security/2016/dsa-3622.wml diff --git a/english/security/2016/dsa-3622.data b/english/security/2016/dsa-3622.data new file mode 100644 index 00000000000..7c24fd83d90 --- /dev/null +++ b/english/security/2016/dsa-3622.data @@ -0,0 +1,13 @@ +DSA-3622-1 python-django +2016-7-18 +CVE-2016-6186 +python-django +yes +yes +no + +#use wml::debian::security + + + + diff --git a/english/security/2016/dsa-3622.wml b/english/security/2016/dsa-3622.wml new file mode 100644 index 00000000000..82dfeaade63 --- /dev/null +++ b/english/security/2016/dsa-3622.wml @@ -0,0 +1,15 @@ +security update + +

It was discovered that Django, a high-level Python web development +framework, is prone to a cross-site scripting vulnerability in the +admin's add/change related popup.

+ +

For the stable distribution (jessie), this problem has been fixed in +version 1.7.7-1+deb8u5.

+ +

We recommend that you upgrade your python-django packages.

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2016/dsa-3622.data" +# $Id$ -- cgit v1.2.3