diff options
| author | Tim Graham <timograham@gmail.com> | 2015-01-13 14:44:08 -0500 |
|---|---|---|
| committer | Tim Graham <timograham@gmail.com> | 2015-01-13 14:44:08 -0500 |
| commit | 1913c1ac2190cdc31de9dcd81687f5dad057e2f0 (patch) | |
| tree | 325853ae253b8ce6d2e7a28ee8b0636d2f69e907 /docs/releases/security.txt | |
| parent | 7ecd654497e778550735b77794eae62a9d014272 (diff) | |
Added today's security issues to the archive.
Diffstat (limited to 'docs/releases/security.txt')
| -rw-r--r-- | docs/releases/security.txt | 53 |
1 files changed, 53 insertions, 0 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt index 7af0300f56..f42583f16c 100644 --- a/docs/releases/security.txt +++ b/docs/releases/security.txt @@ -516,3 +516,56 @@ Versions affected * Django 1.5 `(patch) <https://github.com/django/django/commit/2a446c896e7c814661fb9c4f212b071b2a7fa446>`__ * Django 1.6 `(patch) <https://github.com/django/django/commit/f7c494f2506250b8cb5923714360a3642ed63e0f>`__ * Django 1.7 `(patch) <https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6>`__ + +January 13, 2015 - CVE-2015-0219 +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +`CVE-2015-0219 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0219&cid=2>`_: +WSGI header spoofing via underscore/dash conflation. +`Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__ + +Versions affected +----------------- + +* Django 1.4 `(patch) <https://github.com/django/django/commit/4f6fffc1dc429f1ad428ecf8e6620739e8837450>`__ +* Django 1.6 `(patch) <https://github.com/django/django/commit/d7597b31d5c03106eeba4be14a33b32a5e25f4ee>`__ +* Django 1.7 `(patch) <https://github.com/django/django/commit/41b4bc73ee0da7b2e09f4af47fc1fd21144c710f>`__ + +January 13, 2015 - CVE-2015-0220 +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +`CVE-2015-0220 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0220&cid=2>`_: Mitigated possible XSS attack via user-supplied redirect URLs. `Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__ + +Versions affected +----------------- + +* Django 1.4 `(patch) <https://github.com/django/django/commit/4c241f1b710da6419d9dca160e80b23b82db7758>`__ +* Django 1.6 `(patch) <https://github.com/django/django/commit/72e0b033662faa11bb7f516f18a132728aa0ae28>`__ +* Django 1.7 `(patch) <https://github.com/django/django/commit/de67dedc771ad2edec15c1d00c083a1a084e1e89>`__ + +January 13, 2015 - CVE-2015-0221 +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +`CVE-2015-0221 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0221&cid=2>`_: +Denial-of-service attack against ``django.views.static.serve()``. +`Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__ + +Versions affected +----------------- + +* Django 1.4 `(patch) <https://github.com/django/django/commit/d020da6646c5142bc092247d218a3d1ce3e993f7>`__ +* Django 1.6 `(patch) <https://github.com/django/django/commit/553779c4055e8742cc832ed525b9ee34b174934f>`__ +* Django 1.7 `(patch) <https://github.com/django/django/commit/818e59a3f0fbadf6c447754d202d88df025f8f2a>`__ + +January 13, 2015 - CVE-2015-0222 +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +`CVE-2015-0222 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0222&cid=2>`_: +Database denial-of-service with ``ModelMultipleChoiceField``. +`Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__ + +Versions affected +----------------- + +* Django 1.6 `(patch) <https://github.com/django/django/commit/d7a06ee7e571b6dad07c0f5b519b1db02e2a476c>`__ +* Django 1.7 `(patch) <https://github.com/django/django/commit/bcfb47780ce7caecb409a9e9c1c314266e41d392>`__ |
