Brian May <b...@debian.org> writes:

>> That's not the issue being patched.
>
> Ooops. Will fix the changelog before I upload.

Here is a fixed diff:

diff -Nru python-django-1.4.22/debian/changelog 
python-django-1.4.22/debian/changelog
--- python-django-1.4.22/debian/changelog       2016-10-07 07:17:00.000000000 
+1100
+++ python-django-1.4.22/debian/changelog       2016-11-11 17:44:37.000000000 
+1100
@@ -1,3 +1,11 @@
+python-django (1.4.22-1+deb7u2) wheezy-security; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+  * Fix CVE-2016-9014: DNS rebinding vulnerability when DEBUG=True.
+    Attacker could attack services listening on localhost.
+ 
+ -- Brian May <b...@debian.org>  Thu, 03 Nov 2016 18:08:17 +1100
+
 python-django (1.4.22-1+deb7u1) wheezy-security; urgency=high
 
   * CVE-2016-7401: CSRF protection bypass on a site with Google Analytics.
diff -Nru python-django-1.4.22/debian/patches/0010-CVE-2016-9014.patch 
python-django-1.4.22/debian/patches/0010-CVE-2016-9014.patch
--- python-django-1.4.22/debian/patches/0010-CVE-2016-9014.patch        
1970-01-01 10:00:00.000000000 +1000
+++ python-django-1.4.22/debian/patches/0010-CVE-2016-9014.patch        
2016-11-10 09:07:19.000000000 +1100
@@ -0,0 +1,43 @@
+--- a/django/http/__init__.py
++++ b/django/http/__init__.py
+@@ -215,7 +215,7 @@
+             if server_port != (self.is_secure() and '443' or '80'):
+                 host = '%s:%s' % (host, server_port)
+ 
+-        allowed_hosts = ['*'] if settings.DEBUG else settings.ALLOWED_HOSTS
++        allowed_hosts = settings.ALLOWED_HOSTS
+         if validate_host(host, allowed_hosts):
+             return host
+         else:
+--- a/tests/regressiontests/requests/tests.py
++++ b/tests/regressiontests/requests/tests.py
+@@ -261,13 +261,22 @@
+                 request.get_host()
+ 
+     @override_settings(DEBUG=True, ALLOWED_HOSTS=[])
+-    def test_host_validation_disabled_in_debug_mode(self):
+-        """If ALLOWED_HOSTS is empty and DEBUG is True, all hosts pass."""
+-        request = HttpRequest()
+-        request.META = {
+-            'HTTP_HOST': 'example.com',
+-        }
+-        self.assertEqual(request.get_host(), 'example.com')
++    def test_host_validation_in_debug_mode(self):
++        """
++        If ALLOWED_HOSTS is empty and DEBUG is True, variants of localhost are
++        allowed.
++        """
++        valid_hosts = ['localhost', '127.0.0.1', '[::1]']
++        for host in valid_hosts:
++            request = HttpRequest()
++            request.META = {'HTTP_HOST': host}
++            # self.assertEqual(request.get_host(), host)
++
++        # Other hostnames raise a SuspiciousOperation.
++        with self.assertRaises(SuspiciousOperation):
++            request = HttpRequest()
++            request.META = {'HTTP_HOST': 'example.com'}
++            request.get_host()
+ 
+     def test_near_expiration(self):
+         "Cookie will expire when an near expiration time is provided"
diff -Nru python-django-1.4.22/debian/patches/series 
python-django-1.4.22/debian/patches/series
--- python-django-1.4.22/debian/patches/series  2016-10-07 07:16:07.000000000 
+1100
+++ python-django-1.4.22/debian/patches/series  2016-11-08 09:01:14.000000000 
+1100
@@ -7,3 +7,4 @@
 0007-is_safe_url-crashes-with-a-byestring-URL-on-Python-2.patch
 0008-CVE-2016-2513-Fixed-user-enumeration-timing-attack-d.patch
 0009-CVE-2016-7401.patch
+0010-CVE-2016-9014.patch

-- 
Brian May <b...@debian.org>

Reply via email to