Name | CVE-2015-5144 |
Description | Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-272-1, DSA-3305-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
python-django (PTS) | jessie, jessie (lts) | 1.7.11-1+deb8u17 | fixed |
stretch (security) | 1:1.10.7-2+deb9u17 | fixed | |
stretch (lts), stretch | 1:1.10.7-2+deb9u23 | fixed | |
buster, buster (lts) | 1:1.11.29-1+deb10u12 | fixed | |
buster (security) | 1:1.11.29-1+deb10u11 | fixed | |
bullseye (security), bullseye | 2:2.2.28-1~deb11u2 | fixed | |
bookworm (security), bookworm | 3:3.2.19-1+deb12u1 | fixed | |
sid, trixie | 3:4.2.16-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
python-django | source | squeeze | 1.2.3-3+squeeze13 | DLA-272-1 | ||
python-django | source | wheezy | 1.4.5-1+deb7u12 | DSA-3305-1 | ||
python-django | source | jessie | 1.7.7-1+deb8u1 | DSA-3305-1 | ||
python-django | source | (unstable) | 1.7.9-1 |
https://www.djangoproject.com/weblog/2015/jul/08/security-releases/
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-5144 has split out patches