[ubuntu/precise-security] python-django 1.3.1-4ubuntu1.17 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Thu Jul 9 11:14:51 UTC 2015
python-django (1.3.1-4ubuntu1.17) precise-security; urgency=medium
* SECURITY UPDATE: denial of service via empty session records
- debian/patches/no_implicit_session_key.patch: don't perform implicit
initialization of the session key on the first access in
django/contrib/sessions/backends/base.py,
django/contrib/sessions/backends/cache.py,
django/contrib/sessions/backends/cached_db.py,
django/contrib/sessions/backends/db.py,
django/contrib/sessions/backends/file.py,
adjusted tests in django/contrib/sessions/tests.py,
tests/regressiontests/test_client_regress/session.py.
- debian/patches/CVE-2015-5143.patch: avoid creating a session record
when loading the session in
django/contrib/sessions/backends/cache.py,
django/contrib/sessions/backends/cached_db.py,
django/contrib/sessions/backends/db.py,
django/contrib/sessions/backends/file.py,
added test to django/contrib/sessions/tests.py.
- CVE-2015-5143
* SECURITY UPDATE: header injection via newlines
- debian/patches/CVE-2015-5144.patch: check for newlines in
django/core/validators.py, added tests to
tests/modeltests/validators/tests.py.
- CVE-2015-5144
Date: 2015-07-02 17:58:12.782093+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/python-django/1.3.1-4ubuntu1.17
-------------- next part --------------
Sorry, changesfile not available.
More information about the Precise-changes
mailing list