ArchLinux: 201508-9: python-django, python2-django: denial of service
Summary
Previously, a session could be created when anonymously accessing the django.contrib.auth.views.logout view (provided it wasn't decorated with django.contrib.auth.decorators.login_required as done in the admin). This could allow an attacker to easily create many new session records by sending repeated requests, potentially filling up the session store or causing other users' session records to be evicted. The django.contrib.sessions.middleware.SessionMiddleware has been modified to no longer create empty session records.
Resolution
Upgrade to 1.8.4-1.
# pacman -Syu "python-django>=1.8.4-1"
# pacman -Syu "python2-django>=1.8.4-1"
The problem has been fixed upstream in version 1.8.4, 1.7.10 and 1.4.22.
References
https://www.djangoproject.com/weblog/2015/aug/18/security-releases/ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5963
Workaround
None.