-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3305-1 security@xxxxxxxxxx https://www.debian.org/security/ Alessandro Ghedini July 08, 2015 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : python-django CVE ID : CVE-2015-5143 CVE-2015-5144 Several vulnerabilities were discovered in Django, a high-level Python web development framework: CVE-2015-5143 Eric Peterson and Lin Hua Cheng discovered that a new empty record used to be created in the session storage every time a session was accessed and an unknown session key was provided in the request cookie. This could allow remote attackers to saturate the session store or cause other users' session records to be evicted. CVE-2015-5144 Sjoerd Job Postmus discovered that some built-in validators did not properly reject newlines in input values. This could allow remote attackers to inject headers in emails and HTTP responses. For the oldstable distribution (wheezy), these problems have been fixed in version 1.4.5-1+deb7u12. For the stable distribution (jessie), these problems have been fixed in version 1.7.7-1+deb8u1. For the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your python-django packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJVnaCtAAoJEK+lG9bN5XPLdFkP/icUQnteQ8R7TXTEayLjpLE5 oAbyVCq/VsnFOA5/V5pJTYWbMyx2X+U9MuZVNKBhwUd7CVGqMDFVO7Sg2p229UOY QwzKmwm6b0h16skmMwbTzr2Gj02Lu6dUTjE3nTZJMu5fkmenF0oYEaOOVlnFm5/t q+8UAAEeohy0S2mM/2hley7YglcmtNxT3r+Ryx83NRwS0wVO7Lgb6owQ9kbWTThT G3zTa+8NIFDL1/rcBDcM3a6Kx48Umg9SMHVlxr4VvE1/1oKvqg23L20ZxuqnCIFo pFdYELyb9C1GKutAJ9oet6fRRwyOxw8w6YJ+H6BIqt9MOduWDAAmW9uDmHzHszwQ GsnespPLnX3pwFTX6JRhrPRvyp9uvMYpIfxGhAnLFSF8ipxx6f6h0jtniQf4nuhC BaMmZwz61uywD5ETfebWLFibXkX9MMnrkIVhI44dkGKPYMx3wI40d8t3YrxCjf/1 P9k1LxzFO9JM9FmwDSh1C8bLtTiwkCkrX4ksaRX17Snb2LaGGFvWBDq1nF3SRF/T IcD7fwQgJX6ub894/7MfedhO1aS8jvDI/AwJxnXBRZGmaYE25SoZZ6zRPTtNpZCo mZFhC4hlujZfsqAKH/ZMXcBboXBQO9b5jqdGudeB5cf0NJ6HLygEFUcQMz4DPT0O ECAfQ41MEJvaQQEBIH1N =VzIQ -----END PGP SIGNATURE-----