UbuntuUpdates.org

Package "python-django"

Name: python-django

Description:

High-level Python web development framework (Python 2 version)

Latest version: 1:1.11.11-1ubuntu1.5
Release: bionic (18.04)
Level: security
Repository: main
Homepage: http://www.djangoproject.com/

Links

Save this URL for the latest version of "python-django": https://www.ubuntuupdates.org/python-django


Download "python-django"


Other versions of "python-django" in Bionic

Repository Area Version
base main 1:1.11.11-1ubuntu1
updates main 1:1.11.11-1ubuntu1.5

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1:1.11.11-1ubuntu1.5 2019-08-01 13:07:09 UTC

  python-django (1:1.11.11-1ubuntu1.5) bionic-security; urgency=medium

  * SECURITY UPDATE: Denial-of-service possibility in
    django.utils.text.Truncator
    - debian/patches/CVE-2019-14232.patch: adjusted regex to avoid
      backtracking issues when truncating HTML in django/utils/text.py,
      tests/template_tests/filter_tests/test_truncatewords_html.py,
      tests/utils_tests/test_text.py.
    - CVE-2019-14232
  * SECURITY UPDATE: Denial-of-service possibility in strip_tags()
    - debian/patches/CVE-2019-14233.patch: prevented excessive HTMLParser
      recursion in strip_tags() when handling incomplete HTML entities in
      django/utils/html.py, tests/utils_tests/test_html.py.
    - CVE-2019-14233
  * SECURITY UPDATE: SQL injection possibility in key and index lookups for
    JSONField/HStoreField
    - debian/patches/CVE-2019-14234.patch: protected JSONField/HStoreField
      key and index lookups against SQL injection in
      django/contrib/postgres/fields/hstore.py,
      django/contrib/postgres/fields/jsonb.py,
      tests/postgres_tests/test_hstore.py,
      tests/postgres_tests/test_json.py.
    - CVE-2019-14234
  * SECURITY UPDATE: Potential memory exhaustion in
    django.utils.encoding.uri_to_iri()
    - debian/patches/CVE-2019-14235.patch: fixed potential memory
      exhaustion in django.utils.encoding.uri_to_iri() in
      django/utils/encoding.py, tests/utils_tests/test_encoding.py.
    - CVE-2019-14235

 -- Marc Deslauriers <email address hidden> Fri, 26 Jul 2019 07:29:57 -0400

Source diff to previous version
CVE-2019-14232 RESERVED
CVE-2019-14233 RESERVED
CVE-2019-14234 RESERVED
CVE-2019-14235 RESERVED

Version: 1:1.11.11-1ubuntu1.4 2019-07-01 15:07:07 UTC

  python-django (1:1.11.11-1ubuntu1.4) bionic-security; urgency=medium

  * SECURITY UPDATE: Incorrect HTTP detection with reverse-proxy
    connecting via HTTPS
    - debian/patches/CVE-2019-12781.patch: made HttpRequest always
      trusty SECURE_PROXY_SSL_HEADER if set in django/http/request.py,
      docs/ref/settings.txt and added tests to tests/settings_test/tests.py.
    - CVE-2019-12781
  * SECURITY UPDATE: XSS in Django admin via AdminURLFieldWidget
    - debian/patches/CVE-2019-12308.patch: made AdminURLFieldWidget
      validate URL before rendering clickable link in
      django/contrib/admin/templates/admin/widgets/url.html,
      django/contrib/admin/widgets.py add test test/admin_widgets/tests.py.
    - CVE-2019-12308

 -- <email address hidden> (Leonidas S. Barbosa) Mon, 24 Jun 2019 11:50:51 -0300

Source diff to previous version
CVE-2019-12781 Incorrect HTTP detection with reverse-proxy connecting via HTTPS
CVE-2019-12308 An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the Admin

Version: 1:1.11.11-1ubuntu1.3 2019-02-13 15:07:04 UTC

  python-django (1:1.11.11-1ubuntu1.3) bionic-security; urgency=medium

  * SECURITY UPDATE: DoS via memory exhaustion
    - debian/patches/CVE-2019-6975.patch: limit digits in
      django/utils/numberformat.py, added tests to
      tests/utils_tests/test_numberformat.py.
    - CVE-2019-6975

 -- Marc Deslauriers <email address hidden> Tue, 12 Feb 2019 08:53:30 -0500

Source diff to previous version
CVE-2019-6975 Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied va

Version: 1:1.11.11-1ubuntu1.2 2019-01-09 19:07:12 UTC

  python-django (1:1.11.11-1ubuntu1.2) bionic-security; urgency=medium

  * SECURITY UPDATE: content spoofing in the default 404 page
    - debian/patches/CVE-2019-3498.patch: properly quote string in
      django/views/defaults.py, add test to tests/handlers/tests.py.
    - CVE-2019-3498

 -- Marc Deslauriers <email address hidden> Tue, 08 Jan 2019 13:41:48 -0500

Source diff to previous version
CVE-2019-3498 Content spoofing possibility in the default 404 page

Version: 1:1.11.11-1ubuntu1.1 2018-08-01 16:06:37 UTC

  python-django (1:1.11.11-1ubuntu1.1) bionic-security; urgency=medium

  * SECURITY UPDATE: open redirect possibility in CommonMiddleware
    - debian/patches/CVE-2018-14574.patch: escape leading slashes in
      django/middleware/common.py, django/urls/resolvers.py,
      django/utils/http.py, tests/middleware/tests.py,
      tests/middleware/urls.py, tests/utils_tests/test_http.py.
    - CVE-2018-14574

 -- Marc Deslauriers <email address hidden> Thu, 26 Jul 2018 08:18:03 -0400

CVE-2018-14574 Open redirect possibility in CommonMiddleware



About   -   Send Feedback to @ubuntu_updates