Hello community,
here is the log from the commit of package python-django.2992 for
openSUSE:12.3:Update checked in at 2014-09-16 14:21:49
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:12.3:Update/python-django.2992 (Old)
and /work/SRC/openSUSE:12.3:Update/.python-django.2992.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-django.2992"
Changes:
--------
New Changes file:
--- /dev/null 2014-07-24 01:57:42.080040256 +0200
+++
/work/SRC/openSUSE:12.3:Update/.python-django.2992.new/python-django.changes
2014-09-16 14:21:52.000000000 +0200
@@ -0,0 +1,292 @@
+-------------------------------------------------------------------
+Mon Sep 8 14:27:15 UTC 2014 - [email protected]
+
+- Update to version 1.4.15
+ + Prevented reverse() from generating URLs pointing to other hosts
+ to prevent phishing attacks (bnc#893087, CVE-2014-0480)
+ + Removed O(n) algorithm when uploading duplicate file names
+ to fix file upload denial of service (bnc#893088, CVE-2014-0481)
+ + Modified RemoteUserMiddleware to logout on REMOTE_USE change
+ to prevent session hijacking (bnc#893089, CVE-2014-0482)
+ + Prevented data leakage in contrib.admin via query string manipulation
+ (bnc#893090, CVE-2014-0483)
+ + Fixed: Caches may incorrectly be allowed to store and serve private data
+ (bnc#877993, CVE-2014-1418)
+ + Fixed: Malformed redirect URLs from user input not correctly validated
+ (bnc#878641, CVE-2014-3730)
+ + Fixed queries that may return unexpected results on MySQL
+ due to typecasting (bnc#874956, CVE-2014-0474)
+ + Prevented leaking the CSRF token through caching
+ (bnc#874955, CVE-2014-0473)
+ + Fixed a remote code execution vulnerabilty in URL reversing
+ (bnc#874950, CVE-2014-0472)
+
+-------------------------------------------------------------------
+Tue Sep 17 15:26:40 UTC 2013 - [email protected]
+
+- Update to version 1.4.8 (bnc#840832, bnc#840832, CVE-2013-1443):
+ + Fixed denial-of-service via large passwords
+- Changes from version 1.4.7:
+ + Fixed directory traversal with ssi template tag
+- Changes from version 1.4.6:
+ + Fixed Cross-site scripting (XSS) in admin interface
+ + Fixed Possible XSS via is_safe_url
+
+-------------------------------------------------------------------
+Mon Jul 8 21:42:07 UTC 2013 - [email protected]
+
+- Update to 1.4.5:
+ - Security release.
+ - Fix bnc#807175 / bnc#787521 / CVE-2012-4520 / CVE-2013-0305 /
+ CVE-2013-0306 and CVE-2013-1665.
+
+-------------------------------------------------------------------
+Tue Dec 11 12:27:50 UTC 2012 - [email protected]
+
+- Update to 1.4.3:
+ - Security release:
+ - Host header poisoning
+ - Redirect poisoning
+ - Please check release notes for details:
+ https://www.djangoproject.com/weblog/2012/dec/10/security
+
+-------------------------------------------------------------------
+Sat Oct 20 13:41:10 UTC 2012 - [email protected]
+
+- Add a symlink from /usr/bin/django-admin.py to /usr/bin/django-admin
+
+-------------------------------------------------------------------
+Wed Oct 17 22:51:36 UTC 2012 - [email protected]
+
+- Update to 1.4.2:
+ - Security release:
+ - Host header poisoning
+ - Please check release notes for details:
+ https://www.djangoproject.com/weblog/2012/oct/17/security
+
+-------------------------------------------------------------------
+Mon Jul 30 21:38:31 UTC 2012 - [email protected]
+
+- Update to 1.4.1:
+ - Security release:
+ - Cross-site scripting in authentication views
+ - Denial-of-service in image validation
+ - Denial-of-service via get_image_dimensions()
+ - Please check release notes for details:
+ https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
+
+-------------------------------------------------------------------
+Tue Jun 19 11:27:33 UTC 2012 - [email protected]
+
+- Add patch to support CSRF_COOKIE_HTTPONLY config
+
+-------------------------------------------------------------------
+Fri Mar 23 18:39:40 UTC 2012 - [email protected]
+
+- Update to 1.4:
+ - Please read the release notes
+ https://docs.djangoproject.com/en/dev/releases/1.4
+- Removed Patch2, it was merged on upstream,
+
+-------------------------------------------------------------------
+Thu Nov 24 12:30:40 UTC 2011 - [email protected]
+
+- Set license to SDPX style (BSD-3-Clause)
+- Package AUTHORS, LICENE and README files
+- No CFLAGS for noarch package
+- Drop runtime dependency on gettext-tools
+
+-------------------------------------------------------------------
+Sat Sep 10 12:05:07 UTC 2011 - [email protected]
+
+- Update to 1.3.1 to fix security issues, please read
+ https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued.
+
+-------------------------------------------------------------------
+Thu Mar 31 15:09:16 UTC 2011 - [email protected]
+
+- Fix build on SLES_9.
+
+-------------------------------------------------------------------
+Wed Mar 23 11:39:53 UTC 2011 - [email protected]
+
+- Update to 1.3 final;
+- Refresh patch empty-ip-2.diff.
+
+-------------------------------------------------------------------
+Fri Mar 18 03:45:45 UTC 2011 - [email protected]
+
+- Update to 1.3-rc1;
+- Regenerated spec file with py2pack;
+- No more need to fix wrong line endings;
+- Refresh patch empty-ip-2.diff with -p0.
+
+-------------------------------------------------------------------
+Thu Mar 3 09:32:52 UTC 2011 - [email protected]
+
+- Spec file cleanup:
+ * Removed empty lines, package authors from description
+ * Cleanup duplicates
+ * Corrected wrong file endings
+ * Added zero-length rpmlint filter
+- Added AUTHORS, LICENSE and doc files
+
+-------------------------------------------------------------------
+Wed Feb 9 03:37:29 UTC 2011 - [email protected]
+
+- Update to 1.2.5:
+ - This is a security update that fix:
+ - Flaw in CSRF handling;
+ - Potential XSS in file field rendering.
+
+-------------------------------------------------------------------
+Thu Dec 23 10:20:03 UTC 2010 - [email protected]
+
+- Update to 1.2.4:
+ - Information leakage in Django administrative interface;
+ - Denial-of-service attack in password-reset mechanism.
+- This is a mandatory security update.
+
+-------------------------------------------------------------------
+Sat Sep 11 11:46:41 UTC 2010 - [email protected]
+
+- Update to 1.2.3:
+ - The patch applied for the security issue covered in Django
+ 1.2.2 caused issues with non-ASCII responses using CSRF
+ tokens. This has been remedied;
+ - The patch also caused issues with some forms, most notably
+ the user-editing forms in the Django administrative interface.
+ This has been remedied.
+ - The packaging manifest did not contain the full list of
+ required files. This has been remedied.
+
+-------------------------------------------------------------------
+Thu Sep 9 01:06:43 UTC 2010 - [email protected]
+
+- Update to 1.2.2.
+- This is a ciritical security update fixing a default XSS bug!
+
+-------------------------------------------------------------------
+Fri Jul 9 11:27:26 UTC 2010 - [email protected]
+
+- Added patch to fix upstream bug 5622: Empty ipaddress raises an error
+
+-------------------------------------------------------------------
+Mon May 17 21:14:11 UTC 2010 - [email protected]
+
+- Update to 1.2.1.
+
+-------------------------------------------------------------------
+Mon May 17 18:35:20 UTC 2010 - [email protected]
+
+- Update to 1.2.
+
+-------------------------------------------------------------------
+Thu May 6 13:46:03 UTC 2010 - [email protected]
+
+- Update to 1.2-rc-1.
+
+-------------------------------------------------------------------
+Mon Apr 5 02:21:44 UTC 2010 - [email protected]
+
+- Spec file cleaned with spec-cleaner;
+- Minor manual adjusts on spec file.
+
+-------------------------------------------------------------------
+Thu Mar 18 17:47:12 UTC 2010 - [email protected]
+
++++ 95 more lines (skipped)
++++ between /dev/null
++++ and
/work/SRC/openSUSE:12.3:Update/.python-django.2992.new/python-django.changes
New:
----
Django-1.2-completion-only-for-bash.patch
Django-1.4-CSRF_COOKIE_HTTPONLY-support.patch
Django-1.4.15.tar.gz
python-django-rpmlintrc
python-django.changes
python-django.spec
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-django.spec ++++++
#
# spec file for package python-django
#
# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via http://bugs.opensuse.org/
#
Name: python-django
Version: 1.4.15
Release: 0
Summary: A high-level Python Web framework
License: BSD-3-Clause
Group: Development/Languages/Python
Url: http://www.djangoproject.com
# https://www.djangoproject.com/download/1.4.15/tarball/
Source: Django-%{version}.tar.gz
Source1: python-django-rpmlintrc
# PATCH-FIX-UPSTREAM Django-1.2-completion-only-for-bash.patch
Patch1: Django-1.2-completion-only-for-bash.patch
# PATCH-FIX-UPSTREAM - see https://github.com/django/django/pull/150/files
Patch2: Django-1.4-CSRF_COOKIE_HTTPONLY-support.patch
BuildRequires: python-devel
Requires: python-xml
BuildRoot: %{_tmppath}/%{name}-%{version}-build
#Requires: gettext-tools
%if 0%{?suse_version}
%py_requires
%if 0%{?suse_version} > 1110
BuildArch: noarch
%endif
%endif
%{!?python_sitelib: %global python_sitelib %(python -c "from
distutils.sysconfig import get_python_lib; print get_python_lib()")}
%description
Django is a high-level Python Web framework that encourages rapid development
and clean, pragmatic design.
%prep
%setup -q -n Django-%{version}
%patch1
%patch2
%build
python setup.py build
%install
python setup.py install --prefix=%{_prefix} --root=%{buildroot}
install -D -m 0755 extras/django_bash_completion
%{buildroot}%{_sysconfdir}/bash_completion.d/django_bash_completion.sh
ln -s %{_bindir}/django-admin.py %{buildroot}%{_bindir}/django-admin
%files
%defattr(-,root,root,-)
%doc AUTHORS LICENSE README
%{_bindir}/django-admin*
%{python_sitelib}/*
%{_sysconfdir}/bash_completion.d/django_bash_completion.sh
%changelog
++++++ Django-1.2-completion-only-for-bash.patch ++++++
Index: extras/django_bash_completion
===================================================================
--- extras/django_bash_completion.orig
+++ extras/django_bash_completion
@@ -31,6 +31,8 @@
#
# To uninstall, just remove the line from your .bash_profile and .bashrc.
+test -z "$BASH_VERSION" && return
+
_django_completion()
{
COMPREPLY=( $( COMP_WORDS="${COMP_WORDS[*]}" \
++++++ Django-1.4-CSRF_COOKIE_HTTPONLY-support.patch ++++++
Index: django/conf/global_settings.py
===================================================================
--- django/conf/global_settings.py.orig
+++ django/conf/global_settings.py
@@ -535,6 +535,7 @@ CSRF_COOKIE_NAME = 'csrftoken'
CSRF_COOKIE_DOMAIN = None
CSRF_COOKIE_PATH = '/'
CSRF_COOKIE_SECURE = False
+CSRF_COOKIE_HTTPONLY = False
############
# MESSAGES #
Index: django/middleware/csrf.py
===================================================================
--- django/middleware/csrf.py.orig
+++ django/middleware/csrf.py
@@ -208,7 +208,8 @@ class CsrfViewMiddleware(object):
max_age = 60 * 60 * 24 * 7 * 52,
domain=settings.CSRF_COOKIE_DOMAIN,
path=settings.CSRF_COOKIE_PATH,
- secure=settings.CSRF_COOKIE_SECURE
+ secure=settings.CSRF_COOKIE_SECURE,
+ httponly=settings.CSRF_COOKIE_HTTPONLY
)
# Content varies with the CSRF cookie, so set the Vary header.
patch_vary_headers(response, ('Cookie',))
Index: docs/ref/contrib/csrf.txt
===================================================================
--- docs/ref/contrib/csrf.txt.orig
+++ docs/ref/contrib/csrf.txt
@@ -543,6 +543,17 @@ Whether to use a secure cookie for the C
the cookie will be marked as "secure," which means browsers may ensure that the
cookie is only sent under an HTTPS connection.
+CSRF_COOKIE_HTTPONLY
+------------------
+
+.. versionadded:: 1.5
+
+Default: ``False``
+
+Whether to use HttpOnly flag on the CSRF cookie. If this is set to
+``True``, client-side JavaScript will not to be able to access the
+session cookie.
+
CSRF_FAILURE_VIEW
-----------------
Index: docs/ref/settings.txt
===================================================================
--- docs/ref/settings.txt.orig
+++ docs/ref/settings.txt
@@ -362,6 +362,19 @@ Whether to use a secure cookie for the C
the cookie will be marked as "secure," which means browsers may ensure that the
cookie is only sent under an HTTPS connection.
+.. setting:: CSRF_COOKIE_HTTPONLY
+
+CSRF_COOKIE_HTTPONLY
+------------------
+
+.. versionadded:: 1.5
+
+Default: ``False``
+
+Whether to use HttpOnly flag on the CSRF cookie. If this is set to
+``True``, client-side JavaScript will not to be able to access the
+session cookie. See :setting:`SESSION_COOKIE_HTTPONLY`.
+
.. setting:: CSRF_FAILURE_VIEW
CSRF_FAILURE_VIEW
Index: tests/regressiontests/csrf_tests/tests.py
===================================================================
--- tests/regressiontests/csrf_tests/tests.py.orig
+++ tests/regressiontests/csrf_tests/tests.py
@@ -101,7 +101,8 @@ class CsrfViewMiddlewareTest(TestCase):
with self.settings(CSRF_COOKIE_NAME='myname',
CSRF_COOKIE_DOMAIN='.example.com',
CSRF_COOKIE_PATH='/test/',
- CSRF_COOKIE_SECURE=True):
+ CSRF_COOKIE_SECURE=True,
+ CSRF_COOKIE_HTTPONLY=True):
# token_view calls get_token() indirectly
CsrfViewMiddleware().process_view(req, token_view, (), {})
resp = token_view(req)
@@ -110,6 +111,7 @@ class CsrfViewMiddlewareTest(TestCase):
self.assertNotEqual(csrf_cookie, False)
self.assertEqual(csrf_cookie['domain'], '.example.com')
self.assertEqual(csrf_cookie['secure'], True)
+ self.assertEqual(csrf_cookie['httponly'], True)
self.assertEqual(csrf_cookie['path'], '/test/')
self.assertTrue('Cookie' in resp2.get('Vary',''))
++++++ python-django-rpmlintrc ++++++
addFilter("file-not-in-%lang")
addFilter("zero-length")
--
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]