-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2344-1 security@debian.org http://www.debian.org/security/ Florian Weimer November 11, 2011 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : python-django-piston Vulnerability : deserialization vulnerability Problem type : remote Debian-specific: no CVE ID : CVE-2011-4103 Debian Bug : 647315 It was discovered that the Piston framework can deserializes untrusted YAML and Pickle data, leading to remote code execution. (CVE-2011-4103) The old stable distribution (lenny) does not contain a python-django-piston package. For the stable distribution (squeeze), this problem has been fixed in version 0.2.2-1+squeeze1. For the testing distribution (wheezy) and the unstable distribution (sid), this problem has been fixed in version 0.2.2-2. We recommend that you upgrade your python-django-piston packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iQEcBAEBAgAGBQJOvYoMAAoJEL97/wQC1SS+D8AH/3DiGitk5hOvsN4rLl7KQWSO d3MvnfplQWW/tHgKCYo1KqMhGBUXYO0SB7y6IpxP85hsPBK+RBa6SH92lLAHGyJM yYjOik2BtDlVHno0733DgOR5KqymUmAx+cs84Uw5Cl+F/m8ao3+Re+kUvldXmsy5 aJeHCI0HxETmW6QtA719mWolVenJGSf37+chi8vMgQXibFk4H2BbCztq9OuFsFxK 1rLLwalOurdEaui8hqUrgtp2gWIiLEhmXaS5ZdRKh6fvRiyQVNKuC8zXKeHArD7b G+iGr3wadAP4maTxw3Pf+jdo0AiTVCMTemvgjx3glJdP3Yo4sz0mTeuYmGL1vI8= =SY+6 -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/