Debian Security Advisory

DSA-1905-1 python-django -- insufficient input validation

Date Reported:
10 Oct 2009
Affected Packages:
python-django
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 550457.
More information:

The forms library of python-django, a high-level Python web development framework, is using a badly chosen regular expression when validating email addresses and URLs. An attacker can use this to perform denial of service attacks (100% CPU consumption) due to bad backtracking via a specially crafted email address or URL which is validated by the django forms library.

python-django in the oldstable distribution (etch), is not affected by this problem.

For the stable distribution (lenny), this problem has been fixed in version 1.0.2-1+lenny2.

For the testing distribution (squeeze), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in version 1.1.1-1.

We recommend that you upgrade your python-django packages.

Fixed in:

Debian GNU/Linux 5.0 (lenny)

Source:
http://security.debian.org/pool/updates/main/p/python-django/python-django_1.0.2-1+lenny2.dsc
http://security.debian.org/pool/updates/main/p/python-django/python-django_1.0.2.orig.tar.gz
http://security.debian.org/pool/updates/main/p/python-django/python-django_1.0.2-1+lenny2.diff.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/p/python-django/python-django_1.0.2-1+lenny2_all.deb

MD5 checksums of the listed files are available in the original advisory.