[ubuntu/lucid-security] python-django_1.1.1-2ubuntu1.2_i386_translations.tar.gz (delayed), python-django 1.1.1-2ubuntu1.2 (Accepted)

Ubuntu Installer archive at ubuntu.com
Fri Jan 7 01:04:41 UTC 2011


python-django (1.1.1-2ubuntu1.2) lucid-security; urgency=low

  * SECURITY UPDATE: information leak in admin interface
    - debian/patches/08_security_admin_infoleak.diff: validate querystring
      lookup arguments either specify only fields on the model being viewed,
      or cross relations which have been explicitly whitelisted.
    - CVE-2010-4534
  * SECURITY UPDATE:
    - debian/patches/09_security_pasword_reset_dos.diff: adjust
      base36_to_int() function in django.utils.http will now validate the
      length of its input; on input longer than 13 digits (sufficient to
      base36-encode any 64-bit integer), it will now raise ValueError.
      Additionally, the default URL patterns for django.contrib.auth will now
      enforce a maximum length on the relevant parameters.
    - CVE-2010-4535

Date: Mon, 03 Jan 2011 11:31:57 -0600
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/lucid/+source/python-django/1.1.1-2ubuntu1.2
-------------- next part --------------
Format: 1.8
Date: Mon, 03 Jan 2011 11:31:57 -0600
Source: python-django
Binary: python-django python-django-doc
Architecture: source
Version: 1.1.1-2ubuntu1.2
Distribution: lucid-security
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Description: 
 python-django - High-level Python web development framework
 python-django-doc - High-level Python web development framework (documentation)
Changes: 
 python-django (1.1.1-2ubuntu1.2) lucid-security; urgency=low
 .
   * SECURITY UPDATE: information leak in admin interface
     - debian/patches/08_security_admin_infoleak.diff: validate querystring
       lookup arguments either specify only fields on the model being viewed,
       or cross relations which have been explicitly whitelisted.
     - CVE-2010-4534
   * SECURITY UPDATE:
     - debian/patches/09_security_pasword_reset_dos.diff: adjust
       base36_to_int() function in django.utils.http will now validate the
       length of its input; on input longer than 13 digits (sufficient to
       base36-encode any 64-bit integer), it will now raise ValueError.
       Additionally, the default URL patterns for django.contrib.auth will now
       enforce a maximum length on the relevant parameters.
     - CVE-2010-4535
Checksums-Sha1: 
 1088cdaf0c2258011d4a42919104e07d094e948e 2215 python-django_1.1.1-2ubuntu1.2.dsc
 685c1efb50a04d9a45805ebad8e3d87467ebc18f 43848 python-django_1.1.1-2ubuntu1.2.diff.gz
Checksums-Sha256: 
 38c774e1e388d8fc003589e9f4072cc1f5655a25ee6138068f0ee88d715accd8 2215 python-django_1.1.1-2ubuntu1.2.dsc
 9a6f1ca1262165dce6217a3326e9fe45d606d771d20bd97e75cfe8f6e0a17119 43848 python-django_1.1.1-2ubuntu1.2.diff.gz
Files: 
 d18df1b93b0953664165c15870852145 2215 python optional python-django_1.1.1-2ubuntu1.2.dsc
 69baf8e98b78de3762e12023f71d0704 43848 python optional python-django_1.1.1-2ubuntu1.2.diff.gz
Original-Maintainer: Chris Lamb <lamby at debian.org>


More information about the Lucid-changes mailing list