[SECURITY] Fedora 22 Update: python-django-1.8.3-1.fc22

updates at fedoraproject.org updates at fedoraproject.org
Thu Jul 23 08:54:39 UTC 2015


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-11403
2015-07-13 16:44:15
--------------------------------------------------------------------------------

Name        : python-django
Product     : Fedora 22
Version     : 1.8.3
Release     : 1.fc22
URL         : http://www.djangoproject.com/
Summary     : A high-level Python Web framework
Description :
Django is a high-level Python Web framework that encourages rapid
development and a clean, pragmatic design. It focuses on automating as
much as possible and adhering to the DRY (Don't Repeat Yourself)
principle.

--------------------------------------------------------------------------------
Update Information:

update to 1.8.3 fixing 3 CVE
--------------------------------------------------------------------------------
ChangeLog:

* Thu Jul  9 2015 Matthias Runge <mrunge at redhat.com> - 1.8.3-1
- fix DoS via URL validation, CVE-2015-5145 (rhbh#1240526)
- possible header injection due to validators accepting newlines in 
  input, CVE-2015-5144 (rhbz#1239011)
- possible DoS by filling session store, CVE-2015-5143 (rhbz#1239010)
- update to 1.8.3 (rhbz#1241300)
* Mon Jul  6 2015 Matthias Runge <mrunge at redhat.com> - 1.8.2-2
- disable failing py2 tests for now, p3 passes (rhbz#1239824)
* Thu Jun 18 2015 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 1.8.2-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
* Wed May 20 2015 Matthias Runge <mrunge at redhat.com> - 1.8.2-1
- fix CVE-2015-3982 - Fixed session flushing in the cached_db backend
  (rhbz#1223591)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1240526 - CVE-2015-5145 Django: DoS via incorrect URL validation
        https://bugzilla.redhat.com/show_bug.cgi?id=1240526
  [ 2 ] Bug #1239011 - CVE-2015-5144 Django: possible header injection due to validators accepting newlines in input
        https://bugzilla.redhat.com/show_bug.cgi?id=1239011
  [ 3 ] Bug #1239010 - CVE-2015-5143 Django: possible DoS by filling session store
        https://bugzilla.redhat.com/show_bug.cgi?id=1239010
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update python-django' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list