python-django: security bump to version 1.7.3

Fixes:

CVE-2015-0219 - incorrectly handled underscores in WSGI headers. A
remote attacker could possibly use this issue to spoof headers in
certain environments.

CVE-2015-0220 - incorrectly handled user-supplied redirect URLs. A
remote attacker could possibly use this issue to perform a cross-site
scripting attack.

CVE-2015-0221 - incorrectly handled reading files in
django.views.static.serve(). A remote attacker could possibly use this
issue to cause Django to consume resources, resulting in a denial of
service.

CVE-2015-0222 - incorrectly handled forms with ModelMultipleChoiceField.
A remote attacker could possibly use this issue to cause a large number
of SQL queries, resulting in a database denial of service.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
This commit is contained in:
Gustavo Zacarias 2015-01-14 15:21:44 -03:00 committed by Thomas Petazzoni
parent 6952e32f37
commit 23ed2cf2dc
2 changed files with 3 additions and 3 deletions

View file

@ -1,2 +1,2 @@
# sha256 from https://www.djangoproject.com/m/pgp/Django-1.7.2.checksum.txt
sha256 31c6c3c229f8c04b3be87e6afc3492903b57ec8f1188a47b6ae160d90cf653c8 Django-1.7.2.tar.gz
# sha256 from https://www.djangoproject.com/m/pgp/Django-1.7.3.checksum.txt
sha256 f226fb8aa438456968d403f6739de1cf2dad128db86f66ee2b41dfebe3645c5b Django-1.7.3.tar.gz

View file

@ -4,7 +4,7 @@
#
################################################################################
PYTHON_DJANGO_VERSION = 1.7.2
PYTHON_DJANGO_VERSION = 1.7.3
PYTHON_DJANGO_SOURCE = Django-$(PYTHON_DJANGO_VERSION).tar.gz
# The official Django site has an unpractical URL
PYTHON_DJANGO_SITE = https://pypi.python.org/packages/source/D/Django/