This bug was fixed in the package python-django - 1.4.1-2ubuntu0.1
--------------- python-django (1.4.1-2ubuntu0.1) quantal-security; urgency=low
* SECURITY UPDATE: fix Host header poisoning - debian/patches/CVE-2012-4520.diff: adjust HttpRequest.get_host() to raise django.core.exceptions.SuspiciousOperation if Host headers contain potentially dangerous content. Patch thanks to Mackenzie Morgan. - CVE-2012-4520 - LP: #1068486 * debian/patches/docs-update-httponly-cookie.diff: update documentation of HttpOnly cookie option to correctly describe changes to 1.4 -- Jamie Strandboge <email address hidden> Fri, 09 Nov 2012 15:53:27 -0600
This bug was fixed in the package python-django - 1.4.1-2ubuntu0.1
---------------
python-django (1.4.1-2ubuntu0.1) quantal-security; urgency=low
* SECURITY UPDATE: fix Host header poisoning patches/ CVE-2012- 4520.diff: adjust HttpRequest. get_host( ) to core.exceptions .SuspiciousOper ation if Host headers contain patches/ docs-update- httponly- cookie. diff: update documentation of
- debian/
raise django.
potentially dangerous content. Patch thanks to Mackenzie Morgan.
- CVE-2012-4520
- LP: #1068486
* debian/
HttpOnly cookie option to correctly describe changes to 1.4
-- Jamie Strandboge <email address hidden> Fri, 09 Nov 2012 15:53:27 -0600