[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 3305-1] python-django security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3305-1                   security@debian.org
https://www.debian.org/security/                       Alessandro Ghedini
July 08, 2015                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : python-django
CVE ID         : CVE-2015-5143 CVE-2015-5144

Several vulnerabilities were discovered in Django, a high-level Python
web development framework:

CVE-2015-5143

    Eric Peterson and Lin Hua Cheng discovered that a new empty record
    used to be created in the session storage every time a session was
    accessed and an unknown session key was provided in the request
    cookie. This could allow remote attackers to saturate the session
    store or cause other users' session records to be evicted.

CVE-2015-5144

    Sjoerd Job Postmus discovered that some built-in validators did not
    properly reject newlines in input values. This could allow remote
    attackers to inject headers in emails and HTTP responses.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.4.5-1+deb7u12.

For the stable distribution (jessie), these problems have been fixed in
version 1.7.7-1+deb8u1.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your python-django packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=VzIQ
-----END PGP SIGNATURE-----


Reply to: