Debian: DSA-3305-1: python-django security update
Summary
CVE-2015-5143
Eric Peterson and Lin Hua Cheng discovered that a new empty record
used to be created in the session storage every time a session was
accessed and an unknown session key was provided in the request
cookie. This could allow remote attackers to saturate the session
store or cause other users' session records to be evicted.
CVE-2015-5144
Sjoerd Job Postmus discovered that some built-in validators did not
properly reject newlines in input values. This could allow remote
attackers to inject headers in emails and HTTP responses.
For the oldstable distribution (wheezy), these problems have been fixed
in version 1.4.5-1+deb7u12.
For the stable distribution (jessie), these problems have been fixed in
version 1.7.7-1+deb8u1.
For the unstable distribution (sid), these problems will be fixed soon.
We recommend that you upgrade your python-django packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org