2015 m. liepos 12 d., sekmadienis

[SECURITY] [DSA 3305-1] python-django security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3305-1                   security@debian.org
https://www.debian.org/security/                       Alessandro Ghedini
July 08, 2015                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : python-django
CVE ID         : CVE-2015-5143 CVE-2015-5144

Several vulnerabilities were discovered in Django, a high-level Python
web development framework:

CVE-2015-5143

    Eric Peterson and Lin Hua Cheng discovered that a new empty record
    used to be created in the session storage every time a session was
    accessed and an unknown session key was provided in the request
    cookie. This could allow remote attackers to saturate the session
    store or cause other users' session records to be evicted.

CVE-2015-5144

    Sjoerd Job Postmus discovered that some built-in validators did not
    properly reject newlines in input values. This could allow remote
    attackers to inject headers in emails and HTTP responses.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.4.5-1+deb7u12.

For the stable distribution (jessie), these problems have been fixed in
version 1.7.7-1+deb8u1.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your python-django packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Komentarų nėra:

Rašyti komentarą