Closed Bug 1195899 Opened 9 years ago Closed 9 years ago

Django 1.4.22/1.7.10/1.8.4 security update (Input)

Categories

(Input :: General, defect)

defect
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: willkg, Assigned: willkg)

Details

(Whiteboard: p=1 s=input.2015q3)

On Tuesday, August 18th, 2015, the Django project issued a set  of releases to remedy security issues reported. This bug contains descriptions of the issues.

Please read the entirety of this bug. Then either:

1. apply the update and mark this bug as FIXED, or

2. verify this doesn't apply to your project and close this bug with a WONTFIX plus an explanation of why these don't apply to your project


From the blog entry at https://www.djangoproject.com/weblog/2015/aug/18/security-releases/

"""
Denial-of-service possibility in logout() view by filling session store
=======================================================================

Previously, a session could be created when anonymously accessing the django.contrib.auth.views.logout view (provided it wasn't decorated with django.contrib.auth.decorators.login_required as done in the admin). This could allow an attacker to easily create many new session records by sending repeated requests, potentially filling up the session store or causing other users' session records to be evicted.

The django.contrib.sessions.middleware.SessionMiddleware has been modified to no longer create empty session records.

This portion of the fix has been assigned CVE-2015-5963.

Additionally, on the 1.4 and 1.7 series only, the contrib.sessions.backends.base.SessionBase.flush() and cache_db.SessionStore.flush() methods have been modified to avoid creating a new empty session. Maintainers of third-party session backends should check if the same vulnerability is present in their backend and correct it if so.

This portion of the fix has been assigned CVE-2015-5964. Anyone reporting a similar vulnerability in a third-party session backend should not use this CVE ID.


Affected supported versions
===========================

    Django master development branch
    Django 1.8
    Django 1.7
    Django 1.4

Reminder that security support for Django 1.4 ends October 1, 2015.

Per our supported versions policy, Django 1.5 and 1.6 are no longer receiving security updates.
"""
Grabbing this to do now.
Assignee: nobody → willkg
Status: NEW → ASSIGNED
Whiteboard: p=1 s=input.2015q3
Landed in master: https://github.com/mozilla/fjord/commit/8762327d29e0c9fd27c28c65dc529f49ac1d62ec

Pushed to prod just now.
Status: ASSIGNED → RESOLVED
Closed: 9 years ago
Resolution: --- → FIXED
These bugs are all resolved, so I'm removing the security flag from them.
Group: websites-security
You need to log in before you can comment on or make changes to this bug.