[ubuntu/precise-security] python-django 1.3.1-4ubuntu1.17 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Thu Jul 9 11:14:51 UTC 2015


python-django (1.3.1-4ubuntu1.17) precise-security; urgency=medium

  * SECURITY UPDATE: denial of service via empty session records
    - debian/patches/no_implicit_session_key.patch: don't perform implicit
      initialization of the session key on the first access in
      django/contrib/sessions/backends/base.py,
      django/contrib/sessions/backends/cache.py,
      django/contrib/sessions/backends/cached_db.py,
      django/contrib/sessions/backends/db.py,
      django/contrib/sessions/backends/file.py,
      adjusted tests in django/contrib/sessions/tests.py,
      tests/regressiontests/test_client_regress/session.py.
    - debian/patches/CVE-2015-5143.patch: avoid creating a session record
      when loading the session in
      django/contrib/sessions/backends/cache.py,
      django/contrib/sessions/backends/cached_db.py,
      django/contrib/sessions/backends/db.py,
      django/contrib/sessions/backends/file.py,
      added test to django/contrib/sessions/tests.py.
    - CVE-2015-5143
  * SECURITY UPDATE: header injection via newlines
    - debian/patches/CVE-2015-5144.patch: check for newlines in
      django/core/validators.py, added tests to
      tests/modeltests/validators/tests.py.
    - CVE-2015-5144

Date: 2015-07-02 17:58:12.782093+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/python-django/1.3.1-4ubuntu1.17
-------------- next part --------------
Sorry, changesfile not available.


More information about the Precise-changes mailing list