Your message dated Mon, 12 Nov 2007 05:25:53 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#448838: fixed in python-django 0.96-1.1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: python-django
Severity: important
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for python-django.

CVE-2007-5712[0]:
| The internationalization (i18n) framework in Django 0.91, 0.95,
| 0.95.1, and 0.96, when the USE_I18N option and the i18n component are
| enabled, allows remote attackers to cause a denial of service (memory
| consumption) via many HTTP requests with large Accept-Language
| headers.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5712

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgp0WPnCs9Akq.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: python-django
Source-Version: 0.96-1.1

We believe that the bug you reported is fixed in the latest version of
python-django, which is due to be installed in the Debian FTP archive:

python-django_0.96-1.1.diff.gz
  to pool/main/p/python-django/python-django_0.96-1.1.diff.gz
python-django_0.96-1.1.dsc
  to pool/main/p/python-django/python-django_0.96-1.1.dsc
python-django_0.96-1.1_all.deb
  to pool/main/p/python-django/python-django_0.96-1.1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Golde <[EMAIL PROTECTED]> (supplier of updated python-django package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 04 Nov 2007 13:56:02 +0100
Source: python-django
Binary: python-django
Architecture: source all
Version: 0.96-1.1
Distribution: unstable
Urgency: high
Maintainer: Brett Parker <[EMAIL PROTECTED]>
Changed-By: Nico Golde <[EMAIL PROTECTED]>
Description: 
 python-django - A high-level Python Web framework
Closes: 448838
Changes: 
 python-django (0.96-1.1) unstable; urgency=high
 .
   * Non-maintainer upload by testing security team.
   * Added patch to fix remote denial of service via multiple crafted HTTP
     requests (CVE-2007-5712) (Closes: #448838).
Files: 
 0c96a51daea7da3fd0d219bd3d0dce61 884 python optional python-django_0.96-1.1.dsc
 1d8b65ce4a8d2f4cb9e45df71deccf2f 8369 python optional 
python-django_0.96-1.1.diff.gz
 a465721068c26206b43401962f094e64 1728296 python optional 
python-django_0.96-1.1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHNt9AHYflSXNkfP8RAtWGAJ9kHwHJBYnEKy6kX+JUNPR38LHofACdEPsN
8x2TdOiGsR3SoCvJaKkuxtk=
=reLZ
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to