1.5.4.txt 1.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940
  1. ==========================
  2. Django 1.5.4 release notes
  3. ==========================
  4. *September 14, 2013*
  5. This is Django 1.5.4, the fourth release in the Django 1.5 series. It addresses
  6. two security issues and one bug.
  7. Denial-of-service via password hashers
  8. --------------------------------------
  9. In previous versions of Django, no limit was imposed on the plaintext
  10. length of a password. This allowed a denial-of-service attack through
  11. submission of bogus but extremely large passwords, tying up server
  12. resources performing the (expensive, and increasingly expensive with
  13. the length of the password) calculation of the corresponding hash.
  14. As of 1.5.4, Django's authentication framework imposes a 4096-byte
  15. limit on passwords, and will fail authentication with any submitted
  16. password of greater length.
  17. Corrected usage of :func:`~django.views.decorators.debug.sensitive_post_parameters` in :mod:`django.contrib.auth`’s admin
  18. -------------------------------------------------------------------------------------------------------------------------
  19. The decoration of the ``add_view`` and ``user_change_password`` user admin
  20. views with :func:`~django.views.decorators.debug.sensitive_post_parameters`
  21. did not include :func:`~django.utils.decorators.method_decorator` (required
  22. since the views are methods) resulting in the decorator not being properly
  23. applied. This usage has been fixed and
  24. :func:`~django.views.decorators.debug.sensitive_post_parameters` will now
  25. throw an exception if it's improperly used.
  26. Bugfixes
  27. ========
  28. * Fixed a bug that prevented a ``QuerySet`` that uses
  29. :meth:`~django.db.models.query.QuerySet.prefetch_related` from being pickled
  30. and unpickled more than once (the second pickling attempt raised an
  31. exception) (#21102).