James Bennett of Django reports: Django's serialization framework includes support for serializing to, and deserializing from, XML. Django's XML deserialization is vulnerable to entity-expansion and external-entity/DTD attacks. To remedy this, Django's XML deserializer no longer allows DTDs, performs entity expansion, or fetches external entities/DTDs. Note that this only protects Django's XML serialization framework; if your application parses XML, we recommend you look into the defusedxml Python packages which remedy this for Python itself. Because this issue also affects Python's XML libraries, it is covered by Python's CVE-2013-1664 and CVE-2013-1665. External reference: https://www.djangoproject.com/weblog/2013/feb/19/security/
Created Django tracking bugs for this issue Affects: epel-5 [bug 913043]
Created Django14 tracking bugs for this issue Affects: epel-6 [bug 913045]
Created Django tracking bugs for this issue Affects: epel-6 [bug 913044]
Created Django tracking bugs for this issue Affects: fedora-17 [bug 913048]
Django14-1.4.5-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
python-django-1.4.5-2.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
Django-1.4.5-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: OpenStack Folsom for RHEL 6 Via RHSA-2013:0670 https://rhn.redhat.com/errata/RHSA-2013-0670.html
Every depending bug is fixed. Closing this one, too.