[Bug 1309779] Re: Unexpected code execution using ``reverse()``
Launchpad Bug Tracker
1309779 at bugs.launchpad.net
Tue Apr 22 11:53:12 UTC 2014
This bug was fixed in the package python-django - 1.3.1-4ubuntu1.9
---------------
python-django (1.3.1-4ubuntu1.9) precise-security; urgency=medium
* SECURITY UPDATE: unexpected code execution using reverse()
(LP: #1309779)
- debian/patches/CVE-2014-0472.patch: added filtering to
django/core/urlresolvers.py, added tests to
tests/regressiontests/urlpatterns_reverse/nonimported_module.py,
tests/regressiontests/urlpatterns_reverse/tests.py,
tests/regressiontests/urlpatterns_reverse/urls.py,
tests/regressiontests/urlpatterns_reverse/views.py.
- CVE-2014-0472
* SECURITY UPDATE: caching of anonymous pages could reveal CSRF token
(LP: #1309782)
- debian/patches/CVE-2014-0473.patch: don't cache responses with a
cookie in django/middleware/cache.py.
- CVE-2014-0473
* SECURITY UPDATE: MySQL typecasting issue (LP: #1309784)
- debian/patches/CVE-2014-0474.patch: convert arguments to correct
type in django/db/models/fields/__init__.py, updated docs in
docs/howto/custom-model-fields.txt, docs/ref/databases.txt,
docs/ref/models/querysets.txt, docs/topics/db/sql.txt, added tests to
tests/regressiontests/model_fields/tests.py.
- CVE-2014-0474
-- Marc Deslauriers <marc.deslauriers at ubuntu.com> Sat, 19 Apr 2014 09:27:04 -0400
** Changed in: python-django (Ubuntu Precise)
Status: New => Fix Released
** Changed in: python-django (Ubuntu Quantal)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to python-django in Ubuntu.
https://bugs.launchpad.net/bugs/1309779
Title:
Unexpected code execution using ``reverse()``
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-django/+bug/1309779/+subscriptions
More information about the Ubuntu-server-bugs
mailing list