Debian Security Advisory
DSA-1905-1 python-django -- insufficient input validation
- Date Reported:
- 10 Oct 2009
- Affected Packages:
- python-django
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 550457.
- More information:
-
The forms library of python-django, a high-level Python web development framework, is using a badly chosen regular expression when validating email addresses and URLs. An attacker can use this to perform denial of service attacks (100% CPU consumption) due to bad backtracking via a specially crafted email address or URL which is validated by the django forms library.
python-django in the oldstable distribution (etch), is not affected by this problem.
For the stable distribution (lenny), this problem has been fixed in version 1.0.2-1+lenny2.
For the testing distribution (squeeze), this problem will be fixed soon.
For the unstable distribution (sid), this problem has been fixed in version 1.1.1-1.
We recommend that you upgrade your python-django packages.
- Fixed in:
-
Debian GNU/Linux 5.0 (lenny)
- Source:
- http://security.debian.org/pool/updates/main/p/python-django/python-django_1.0.2-1+lenny2.dsc
- http://security.debian.org/pool/updates/main/p/python-django/python-django_1.0.2.orig.tar.gz
- http://security.debian.org/pool/updates/main/p/python-django/python-django_1.0.2-1+lenny2.diff.gz
- http://security.debian.org/pool/updates/main/p/python-django/python-django_1.0.2.orig.tar.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/p/python-django/python-django_1.0.2-1+lenny2_all.deb
MD5 checksums of the listed files are available in the original advisory.