{"id":"USN-2915-2","summary":"python-django regression","details":"USN-2915-1 fixed vulnerabilities in Django. The upstream fix for\nCVE-2016-2512 introduced a regression for certain applications. This update\nfixes the problem by applying the complete upstream regression fix.\n\nOriginal advisory details:\n\n Mark Striemer discovered that Django incorrectly handled user-supplied\n redirect URLs containing basic authentication credentials. A remote\n attacker could possibly use this issue to perform a cross-site scripting\n attack or a malicious redirect. (CVE-2016-2512)\n \n Sjoerd Job Postmus discovered that Django incorrectly handled timing when\n doing password hashing operations. A remote attacker could possibly use\n this issue to perform user enumeration. (CVE-2016-2513)\n","modified":"2026-02-10T04:40:57Z","published":"2016-03-07T19:18:47Z","references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2915-2"},{"type":"REPORT","url":"https://launchpad.net/bugs/1553251"}],"affected":[{"package":{"name":"python-django","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/python-django@1.6.1-2ubuntu0.14?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.1-2ubuntu0.14"}]}],"versions":["1.5.4-1ubuntu1","1.6-1","1.6.1-1","1.6.1-2","1.6.1-2ubuntu0.1","1.6.1-2ubuntu0.2","1.6.1-2ubuntu0.3","1.6.1-2ubuntu0.4","1.6.1-2ubuntu0.5","1.6.1-2ubuntu0.6","1.6.1-2ubuntu0.8","1.6.1-2ubuntu0.9","1.6.1-2ubuntu0.10","1.6.1-2ubuntu0.11","1.6.1-2ubuntu0.12","1.6.1-2ubuntu0.13"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"python-django","binary_version":"1.6.1-2ubuntu0.14"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2915-2.json"}}],"schema_version":"1.7.3"}