summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCarl Meyer <carl@oddbird.net>2013-02-19 18:22:22 -0700
committerCarl Meyer <carl@oddbird.net>2013-02-19 18:22:22 -0700
commit5d1791ffd2ffdb70cbcf81a49cb0a7cda3fe1f46 (patch)
tree3ecdf8082cfc9baf0be1733c60b30daf11a9993e
parentf61f800c29e2b421a00b52c51ec513eee944d5d8 (diff)
[1.4.x] Don't characterize XML vulnerabilities as DoS-only.
-rw-r--r--docs/releases/1.4.4.txt11
1 files changed, 5 insertions, 6 deletions
diff --git a/docs/releases/1.4.4.txt b/docs/releases/1.4.4.txt
index cdbf159b79..c5fcbc3e39 100644
--- a/docs/releases/1.4.4.txt
+++ b/docs/releases/1.4.4.txt
@@ -40,12 +40,11 @@ XML deserialization
-------------------
The XML parser in the Python standard library is vulnerable to a number of
-denial-of-service attacks via external entities and entity expansion. Django
-uses this parser for deserializing XML-formatted database fixtures. This
-deserializer is not intended for use with untrusted data, but in order to err
-on the side of safety in Django 1.4.4 the XML deserializer refuses to parse an
-XML document with a DTD (DOCTYPE definition), which closes off these attack
-avenues.
+attacks via external entities and entity expansion. Django uses this parser for
+deserializing XML-formatted database fixtures. This deserializer is not
+intended for use with untrusted data, but in order to err on the side of safety
+in Django 1.4.4 the XML deserializer refuses to parse an XML document with a
+DTD (DOCTYPE definition), which closes off these attack avenues.
These issues in the Python standard library are CVE-2013-1664 and
CVE-2013-1665. More information available `from the Python security team`_.