** Information type changed from Private Security to Public Security
** Also affects: python-django (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: python-django (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: python-django (Ubuntu
This bug was fixed in the package python-django - 1.1.1-2ubuntu1.10
---
python-django (1.1.1-2ubuntu1.10) lucid-security; urgency=medium
* SECURITY UPDATE: unexpected code execution using reverse()
(LP: #1309779)
- debian/patches/CVE-2014-0472.patch: added filtering to
This bug was fixed in the package python-django - 1.6.1-2ubuntu0.1
---
python-django (1.6.1-2ubuntu0.1) trusty-security; urgency=medium
* SECURITY UPDATE: unexpected code execution using reverse()
(LP: #1309779)
- debian/patches/CVE-2014-0472.patch: added filtering to
This bug was fixed in the package python-django - 1.3.1-4ubuntu1.9
---
python-django (1.3.1-4ubuntu1.9) precise-security; urgency=medium
* SECURITY UPDATE: unexpected code execution using reverse()
(LP: #1309779)
- debian/patches/CVE-2014-0472.patch: added filtering to
This bug was fixed in the package python-django - 1.4.1-2ubuntu0.5
---
python-django (1.4.1-2ubuntu0.5) quantal-security; urgency=medium
* SECURITY UPDATE: unexpected code execution using reverse()
(LP: #1309779)
- debian/patches/CVE-2014-0472.patch: added filtering to
This bug was fixed in the package python-django - 1.5.4-1ubuntu1.1
---
python-django (1.5.4-1ubuntu1.1) saucy-security; urgency=medium
* SECURITY UPDATE: unexpected code execution using reverse()
(LP: #1309779)
- debian/patches/CVE-2014-0472.patch: added filtering to
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0472
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0474
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to python-django in Ubuntu.