Debian 10230 Published by

Updated python-django packages has been released for Debian



- -------------------------------------------------------------------------
Debian Security Advisory DSA-3305-1 security@debian.org
https://www.debian.org/security/ Alessandro Ghedini
July 08, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : python-django
CVE ID : CVE-2015-5143 CVE-2015-5144

Several vulnerabilities were discovered in Django, a high-level Python
web development framework:

CVE-2015-5143

Eric Peterson and Lin Hua Cheng discovered that a new empty record
used to be created in the session storage every time a session was
accessed and an unknown session key was provided in the request
cookie. This could allow remote attackers to saturate the session
store or cause other users' session records to be evicted.

CVE-2015-5144

Sjoerd Job Postmus discovered that some built-in validators did not
properly reject newlines in input values. This could allow remote
attackers to inject headers in emails and HTTP responses.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.4.5-1+deb7u12.

For the stable distribution (jessie), these problems have been fixed in
version 1.7.7-1+deb8u1.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your python-django packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/