{"id":"USN-2169-2","summary":"python-django regression","details":"USN-2169-1 fixed vulnerabilities in Django. The upstream security patch\nfor CVE-2014-0472 introduced a regression for certain applications. This\nupdate fixes the problem.\n\nOriginal advisory details:\n\n Benjamin Bach discovered that Django incorrectly handled dotted Python\n paths when using the reverse() function. An attacker could use this issue\n to cause Django to import arbitrary modules from the Python path, resulting\n in possible code execution. (CVE-2014-0472)\n \n Paul McMillan discovered that Django incorrectly cached certain pages that\n contained CSRF cookies. An attacker could possibly use this flaw to obtain\n a valid cookie and perform attacks which bypass the CSRF restrictions.\n (CVE-2014-0473)\n \n Michael Koziarski discovered that Django did not always perform explicit\n conversion of certain fields when using a MySQL database. An attacker\n could possibly use this issue to obtain unexpected results. (CVE-2014-0474)\n","modified":"2026-02-10T04:40:48Z","published":"2014-04-23T04:14:10Z","related":["UBUNTU-CVE-2014-0472"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2169-2"},{"type":"REPORT","url":"https://launchpad.net/bugs/1311433"}],"affected":[{"package":{"name":"python-django","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/python-django@1.6.1-2ubuntu0.2?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.1-2ubuntu0.2"}]}],"versions":["1.5.4-1ubuntu1","1.6-1","1.6.1-1","1.6.1-2","1.6.1-2ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_name":"python-django","binary_version":"1.6.1-2ubuntu0.2"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2169-2.json"}}],"schema_version":"1.7.3"}