[<prev] [next>] [day] [month] [year] [list]
Message-ID: <559da0ae.82f8c20a.2e195.ffffd6a0@mx.google.com>
Date: Thu, 09 Jul 2015 00:14:05 +0200
From: Alessandro Ghedini <ghedo@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3305-1] python-django security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3305-1 security@...ian.org
https://www.debian.org/security/ Alessandro Ghedini
July 08, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : python-django
CVE ID : CVE-2015-5143 CVE-2015-5144
Several vulnerabilities were discovered in Django, a high-level Python
web development framework:
CVE-2015-5143
Eric Peterson and Lin Hua Cheng discovered that a new empty record
used to be created in the session storage every time a session was
accessed and an unknown session key was provided in the request
cookie. This could allow remote attackers to saturate the session
store or cause other users' session records to be evicted.
CVE-2015-5144
Sjoerd Job Postmus discovered that some built-in validators did not
properly reject newlines in input values. This could allow remote
attackers to inject headers in emails and HTTP responses.
For the oldstable distribution (wheezy), these problems have been fixed
in version 1.4.5-1+deb7u12.
For the stable distribution (jessie), these problems have been fixed in
version 1.7.7-1+deb8u1.
For the unstable distribution (sid), these problems will be fixed soon.
We recommend that you upgrade your python-django packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=VzIQ
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists