diff options
author | Peter Korsgaard <peter@korsgaard.com> | 2017-04-27 09:37:18 +0200 |
---|---|---|
committer | Peter Korsgaard <peter@korsgaard.com> | 2017-04-27 21:27:27 +0200 |
commit | 3a66a81b7a9db8e45f15fa63cc0670d158003d5a (patch) | |
tree | 7ca309c9a9738365aa6470ca5d8ab1cf0f0b1e76 /package/python-django/python-django.hash | |
parent | 833082fdb4c7c242a24486cffffc1e9a6f597732 (diff) | |
download | buildroot-3a66a81b7a9db8e45f15fa63cc0670d158003d5a.tar.gz buildroot-3a66a81b7a9db8e45f15fa63cc0670d158003d5a.zip |
python-django: security bump to version 1.10.7
Fixes the following security issues:
Since 1.10.3:
CVE-2016-9013 - User with hardcoded password created when running tests on
Oracle
Marti Raudsepp reported that a user with a hardcoded password is created
when running tests with an Oracle database.
CVE-2016-9014 - DNS rebinding vulnerability when DEBUG=True
Aymeric Augustin discovered that Django does not properly validate the Host
header against settings.ALLOWED_HOSTS when the debug setting is enabled. A
remote attacker can take advantage of this flaw to perform DNS rebinding
attacks.
Since 1.10.7:
CVE-2017-7233 - Open redirect and possible XSS attack via user-supplied
numeric redirect URLs
It was discovered that is_safe_url() does not properly handle certain
numeric URLs as safe. A remote attacker can take advantage of this flaw to
perform XSS attacks or to use a Django server as an open redirect.
CVE-2017-7234 - Open redirect vulnerability in django.views.static.serve()
Phithon from Chaitin Tech discovered an open redirect vulnerability in the
django.views.static.serve() view. Note that this view is not intended for
production use.
Cc: Oli Vogt <oli.vogt.pub01@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'package/python-django/python-django.hash')
-rw-r--r-- | package/python-django/python-django.hash | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/package/python-django/python-django.hash b/package/python-django/python-django.hash index 38b303bbf6..09be18440b 100644 --- a/package/python-django/python-django.hash +++ b/package/python-django/python-django.hash @@ -1,3 +1,3 @@ # md5 from https://pypi.python.org/pypi/django/json, sha256 locally computed -md5 5342e77374b2acd2eafa86d2bb68f8c9 Django-1.10.2.tar.gz -sha256 e127f12a0bfb34843b6e8c82f91e26fff6445a7ca91d222c0794174cf97cbce1 Django-1.10.2.tar.gz +md5 693dfeabad62c561cb205900d32c2a98 Django-1.10.7.tar.gz +sha256 593d779dbc2350a245c4f76d26bdcad58a39895e87304fe6d725bbdf84b5b0b8 Django-1.10.7.tar.gz |