Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 552638 - =dev-python/django-1.8.1: Session hijacking vulnerability (CVE-2015-3982)
Summary: =dev-python/django-1.8.1: Session hijacking vulnerability (CVE-2015-3982)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-06-20 14:40 UTC by GLSAMaker/CVETool Bot
Modified: 2015-06-20 14:41 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2015-06-20 14:40:42 UTC
CVE-2015-3982 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3982):
  The session.flush function in the cached_db backend in Django 1.8.x before
  1.8.2 does not properly flush the session, which allows remote attackers to
  hijack user sessions via an empty string in the session key.
Comment 1 Sean Amoss (RETIRED) gentoo-dev Security 2015-06-20 14:41:51 UTC
*django-1.8.2 (20 May 2015)

	  20 May 2015; Justin Lecher <jlec@gentoo.org> +django-1.8.2.ebuild,
	  -django-1.8.1.ebuild, -django-1.8.ebuild:
	  Version Bump; drop vulnerable Versions, CVE-2015-3982

Maintainers, in the future please open a security bug when you are aware of a vulnerability.

Closing noglsa for ~arch only.