[ubuntu/lucid-security] python-django_1.1.1-2ubuntu1.4_i386_translations.tar.gz, python-django 1.1.1-2ubuntu1.4 (Accepted)

Jamie Strandboge jamie at ubuntu.com
Fri Dec 9 00:08:05 UTC 2011


python-django (1.1.1-2ubuntu1.4) lucid-security; urgency=low

  * SECURITY UPDATE: session manipulation when using django.contrib.sessions
    with memory-based sessions and caching
    - debian/patches/CVE-2011-4136.patch: use namespace of cache to store keys
      for session instead of root namespace
    - CVE-2011-4136
  * SECURITY UPDATE: potential denial of service and information disclosure in
    URLField
    - debian/patches/CVE-2011-4137+4138.patch: set verify_exists to False by
      default and use a timeout if available.
    - CVE-2011-4137, CVE-2011-4138
  * SECURITY UPDATE: potential cache-poisoning via crafted Host header
    - debian/patches/CVE-2011-4139.patch: ignore X-Forwarded-Host header by
      default when constructing full URLs
    - CVE-2011-4139
  * More information on these issues can be found at:
    https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/

Date: Wed, 07 Dec 2011 16:02:57 -0600
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/lucid/+source/python-django/1.1.1-2ubuntu1.4
-------------- next part --------------
Format: 1.8
Date: Wed, 07 Dec 2011 16:02:57 -0600
Source: python-django
Binary: python-django python-django-doc
Architecture: source
Version: 1.1.1-2ubuntu1.4
Distribution: lucid-security
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Description: 
 python-django - High-level Python web development framework
 python-django-doc - High-level Python web development framework (documentation)
Changes: 
 python-django (1.1.1-2ubuntu1.4) lucid-security; urgency=low
 .
   * SECURITY UPDATE: session manipulation when using django.contrib.sessions
     with memory-based sessions and caching
     - debian/patches/CVE-2011-4136.patch: use namespace of cache to store keys
       for session instead of root namespace
     - CVE-2011-4136
   * SECURITY UPDATE: potential denial of service and information disclosure in
     URLField
     - debian/patches/CVE-2011-4137+4138.patch: set verify_exists to False by
       default and use a timeout if available.
     - CVE-2011-4137, CVE-2011-4138
   * SECURITY UPDATE: potential cache-poisoning via crafted Host header
     - debian/patches/CVE-2011-4139.patch: ignore X-Forwarded-Host header by
       default when constructing full URLs
     - CVE-2011-4139
   * More information on these issues can be found at:
     https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/
Checksums-Sha1: 
 781ceb00bec9431c24fc1da8f8e12099d9784716 2215 python-django_1.1.1-2ubuntu1.4.dsc
 b5f37ab933a36efc87d519c03a5e35fd4bea4b2e 50152 python-django_1.1.1-2ubuntu1.4.diff.gz
Checksums-Sha256: 
 46156f4761e5922c0165439d805613e9334064eb1a3f026750c344f2962e5356 2215 python-django_1.1.1-2ubuntu1.4.dsc
 26f2a02f00de6879554d8cf7f09470719531771bc5c4ce5a04ef8fbc51ab30f5 50152 python-django_1.1.1-2ubuntu1.4.diff.gz
Files: 
 da57d6e7c19a409861d1ebe14b2b4ad8 2215 python optional python-django_1.1.1-2ubuntu1.4.dsc
 3f08a38065b0eaa8784a8311b92e8eca 50152 python optional python-django_1.1.1-2ubuntu1.4.diff.gz
Original-Maintainer: Chris Lamb <lamby at debian.org>


More information about the Lucid-changes mailing list