Received: from mail.netbsd.org (mail.netbsd.org [149.20.53.66]) by www.NetBSD.org (Postfix) with ESMTP id 56D6C63EE62 for ; Sat, 23 Feb 2013 17:00:23 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id C97E514A1A3; Sat, 23 Feb 2013 17:00:22 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id F24AA14A19D for ; Sat, 23 Feb 2013 17:00:20 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id fIP34BKV9pgu for ; Sat, 23 Feb 2013 17:00:20 +0000 (UTC) Received: from cvs.netbsd.org (cvs.NetBSD.org [IPv6:2001:4f8:3:7:2e0:81ff:fe30:95bd]) by mail.netbsd.org (Postfix) with ESMTP id 2AC8E14A18C for ; Sat, 23 Feb 2013 17:00:20 +0000 (UTC) Received: by cvs.netbsd.org (Postfix, from userid 500) id 1897D175DD; Sat, 23 Feb 2013 17:00:20 +0000 (UTC) Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" MIME-Version: 1.0 Date: Sat, 23 Feb 2013 17:00:20 +0000 From: "Adam Ciarcinski" Subject: CVS commit: pkgsrc/www/py-django To: pkgsrc-changes@NetBSD.org Reply-To: adam@netbsd.org X-Mailer: log_accum Message-Id: <20130223170020.1897D175DD@cvs.netbsd.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk Module Name: pkgsrc Committed By: adam Date: Sat Feb 23 17:00:19 UTC 2013 Modified Files: pkgsrc/www/py-django: Makefile distinfo Log Message: Changes 1.4.5: Security-fix release. Here's a brief summary of each issue and its resolution: Issue: Host header poisoning: an attacker could cause Django to generate and display URLs that link to arbitrary domains. This could be used as part of a phishing attack. These releases fix this problem by introducing a new setting, ALLOWED_HOSTS, which specifies a whitelist of domains your site is known to respond to. Important: by default Django 1.3.6 and 1.4.4 set ALLOWED_HOSTS to allow all hosts. This means that to actually fix the security vulnerability you should define this setting yourself immediately after upgrading. Issue: Formset denial-of-service: an attacker can abuse Django's tracking of the number of forms in a formset to cause a denial-of-service attack. This has been fixed by adding a default maximum number of forms of 1,000. You can still manually specify a bigger max_num, if you wish, but 1,000 should be enough for anyone. Issue: XML attacks: Django's serialization framework was vulnerable to attacks via XML entity expansion and external references; this is now fixed. However, if you're parsing arbitrary XML in other parts of your application, we recommend you look into the defusedxml Python packages which remedy this anywhere you parse XML, not just via Django's serialization framework. Issue: Data leakage via admin history log: Django's admin interface could expose supposedly-hidden information via its history log. This has been fixed. To generate a diff of this commit: cvs rdiff -u -r1.38 -r1.39 pkgsrc/www/py-django/Makefile cvs rdiff -u -r1.23 -r1.24 pkgsrc/www/py-django/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.