lp://staging/ubuntu/quantal-security/python-django
- Get this branch:
- bzr branch lp://staging/ubuntu/quantal-security/python-django
Branch merges
Related bugs
Related blueprints
Branch information
Recent revisions
- 47. By Seth Arnold
-
* SECURITY UPDATE: cache coherency problems in old Internet Explorer
compatibility functions lead to loss of privacy and cache poisoning
attacks. (LP: #1317663)
- debian/patches/ drop_fix_ ie_for_ vary_1_ 4.diff: remove fix_IE_for_vary()
and fix_IE_for_attach() functions so Cache-Control and Vary headers are
no longer modified. This may introduce some regressions for IE 6 and IE 7
users. Patch from upstream.
- CVE-2014-1418
* SECURITY UPDATE: The validation for redirects did not correctly validate
some malformed URLs, which are accepted by some browsers. This allows a
user to be redirected to an unsafe URL unexpectedly.
- debian/patches/ is_safe_ url_1_4. diff: Forbid URLs starting with '///',
forbid URLs without a host but with a path. Patch from upstream. - 46. By Marc Deslauriers
-
* SECURITY REGRESSION: security fix regression when a view is a partial
(LP: #1311433)
- debian/patches/ CVE-2014- 0472-regression .patch: create the lookup_str
from the original function whenever a partial is provided as an
argument to a url pattern in django/core/urlresolve rs.py,
added tests to tests/regressiontests/ urlpatterns_ reverse/ urls.py,
tests/regressiontests /urlpatterns_ reverse/ views.py.
- CVE-2014-0472 - 45. By Marc Deslauriers
-
* SECURITY UPDATE: unexpected code execution using reverse()
(LP: #1309779)
- debian/patches/ CVE-2014- 0472.patch: added filtering to
django/core/urlresolve rs.py, added tests to
tests/regressiontests /urlpatterns_ reverse/ nonimported_ module. py,
tests/regressiontests /urlpatterns_ reverse/ tests.py,
tests/regressiontests /urlpatterns_ reverse/ urls.py,
tests/regressiontests /urlpatterns_ reverse/ views.py.
- CVE-2014-0472
* SECURITY UPDATE: caching of anonymous pages could reveal CSRF token
(LP: #1309782)
- debian/patches/ CVE-2014- 0473.patch: don't cache responses with a
cookie in django/middleware/ cache.py, added tests to
tests/regressiontests /cache/ tests.py.
- CVE-2014-0473
* SECURITY UPDATE: MySQL typecasting issue (LP: #1309784)
- debian/patches/ CVE-2014- 0474.patch: convert arguments to correct
type in django/db/models/ fields/ __init_ _.py, updated docs in
docs/howto/custom- model-fields. txt, docs/ref/ databases. txt,
docs/ref/models/ querysets. txt, docs/topics/ db/sql. txt, added tests to
tests/regressiontests /model_ fields/ tests.py.
- CVE-2014-0474
* debian/patches/ fix_test_ ftbfs.patch: fix ftbfs with upstream commit. - 44. By Marc Deslauriers
-
* SECURITY UPDATE: denial of service via long passwords (LP: #1225784)
- debian/patches/ CVE-2013- 1443.patch: enforce a maximum password length
in django/contrib/ auth/forms. py, django/ contrib/ auth/hashers. py,
django/contrib/ auth/tests/ hashers. py.
- CVE-2013-1443
* SECURITY UPDATE: directory traversal with ssi template tag
- debian/patches/ CVE-2013- 4315.patch: properly check absolute path in
django/template/ defaulttags. py,
tests/regressiontests /templates/ tests.py.
- CVE-2013-4315
* SECURITY UPDATE: possible XSS via is_safe_url
- debian/patches/ security- is_safe_ url.patch: properly reject URLs which
specify a scheme other then HTTP or HTTPS.
- https://www.djangoproj ect.com/ weblog/ 2013/aug/ 13/security- releases- issued/
- No CVE number
* debian/patches/ fix-validation- tests.patch: fix regression in tests
since example.com is now available via https. - 43. By Marc Deslauriers
-
* SECURITY UPDATE: host header poisoning (LP: #1089337)
- debian/patches/ fix_get_ host.patch: tighten host header validation in
django/http/__ init__. py, add info to docs/topics/ security. txt, add
tests to tests/regressiontests/ requests/ tests.py.
- https://www.djangoproj ect.com/ weblog/ 2012/dec/ 10/security/
- No CVE number
* SECURITY UPDATE: redirect poisoning (LP: #1089337)
- debian/patches/ fix_redirect_ poisoning. patch: tighten validation in
django/contrib/ auth/views. py,
django/contrib/ comments/ views/comments. py,
django/contrib/ comments/ views/moderatio n.py,
django/contrib/ comments/ views/utils. py, django/ utils/http. py,
django/views/i18n. py, add tests to
tests/regressiontests /comment_ tests/tests/ comment_ view_tests. py,
tests/regressiontests /comment_ tests/tests/ moderation_ view_tests. py,
tests/regressiontests /views/ tests/i18n. py.
- https://www.djangoproj ect.com/ weblog/ 2012/dec/ 10/security/
- No CVE number
* SECURITY UPDATE: host header poisoning (LP: #1130445)
- debian/patches/ add_allowed_ hosts.patch: add new ALLOWED_HOSTS setting
to django/conf/global_ settings. py,
django/conf/project_ template/ project_ name/settings. py,
django/contrib/ auth/tests/ views.py,
django/contrib/ contenttypes/ tests.py, django/ contrib/ sites/tests. py,
django/http/__ init__. py, django/ test/utils. py, add docs to
docs/ref/settings. txt, docs/topics/ security. txt, add tests to
tests/regressiontests /csrf_tests/ tests.py,
tests/regressiontests /requests/ tests.py.
- https://www.djangoproj ect.com/ weblog/ 2013/feb/ 19/security/
- No CVE number
* SECURITY UPDATE: XML attacks (LP: #1130445)
- debian/patches/ CVE-2013- 166x.patch: forbid DTDs, entity expansion,
and external entities/DTDs in
django/core/serializer s/xml_serialize r.py, add tests to
tests/regressiontests /serializers_ regress/ tests.py.
- https://www.djangoproj ect.com/ weblog/ 2013/feb/ 19/security/
- CVE-2013-1664
- CVE-2013-1665
* SECURITY UPDATE: Data leakage via admin history log (LP: #1130445)
- debian/patches/ CVE-2013- 0305.patch: add permission checks to history
view in django/contrib/ admin/options. py, add tests to
tests/regressiontests /admin_ views/tests. py.
- https://www.djangoproj ect.com/ weblog/ 2013/feb/ 19/security/
- CVE-2013-0305
* SECURITY UPDATE: Formset denial-of-service (LP: #1130445)
- debian/patches/ CVE-2013- 0306.patch: limit maximum number of forms in
django/forms/formsets. py, add docs to docs/topics/ forms/formsets. txt,
docs/topics/ forms/modelform s.txt, add tests to
tests/regressiontests /forms/ tests/formsets. py,
tests/regressiontests /generic_ inline_ admin/tests. py.
- https://www.djangoproj ect.com/ weblog/ 2013/feb/ 19/security/
- CVE-2013-0306 - 42. By Jamie Strandboge
-
* Add additional tests for CVE-2012-4520
- debian/patches/ CVE-2012- 4520-additional -tests. diff: add various poisoned
host header test material
* Don't fail self-tests if MANAGERS or ADMINS is defined in settings.py
- debian/patches/ lp1080204. diff: Isolate poisoned_http_host tests from 500
- https://code.djangopro ject.com/ ticket/ 19172
- LP: #1080204 - 41. By Jamie Strandboge
-
* SECURITY UPDATE: fix Host header poisoning
- debian/patches/ CVE-2012- 4520.diff: adjust HttpRequest. get_host( ) to
raise django.core.exceptions .SuspiciousOper ation if Host headers contain
potentially dangerous content. Patch thanks to Mackenzie Morgan.
- CVE-2012-4520
- LP: #1068486
* debian/patches/ docs-update- httponly- cookie. diff: update documentation of
HttpOnly cookie option to correctly describe changes to 1.4 - 40. By Raphaël Hertzog
-
* New patch 01_use_
stdlib_ htmlparser_ when_possible. diff to not override
Python stdlib's HTMLParser with Python versions which are unaffected by
http://bugs.python. org/issue670664 Closes: #683648
Thanks to David Watson <email address hidden> for the patch.
* Update the above patch to use the version committed upstream (commit
57d9ccc). - 39. By Raphaël Hertzog
-
* New upstream security and maintenance release. Closes: #683364
Fixes: CVE-2012-3442 CVE-2012-3443 CVE-2012-3444
* Drop 01_disable_broken_ test.diff and 04_hyphen- manpage. diff which
have been merged upstream. - 38. By Raphaël Hertzog
-
* New upstream release. Closes: #666003
* Fix watch file to correctly extract the version number from the URL.
* Updated Standards-Version to 3.9.3 (no change needed).
* Drop 01_disable_url_verify_ regression_ tests.diff since upstream test
suite has been modified to work even without internet connection.
* Update 04_hyphen-manpage. diff to apply again.
* Drop 05_fix_djangodocs_ sphinx_ ext.diff which has been merged
upstream.
* Update 06_use_debian_ geoip_database_ as_default. diff to apply on
renamed file.
* Drop 07_fix_for_sphinx1. 1.2.diff merged upstream.
* Drop 08_fix_test_week_ view_allow_ future. diff, merged upstream.
* Add 01_disable_broken_ test.diff to disable a test that fails with
the current python 2.7 version in Debian.
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)
- Stacked on:
- lp://staging/ubuntu/raring/python-django