Security update for python-django

python-django was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-5144: Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 used an incorrect regular expression, which allowed remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator (bsc#937523).
- CVE-2015-5143: The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allowed remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys (bsc#937522).

Fixed bugs
bnc#937522
VUL-1: CVE-2015-5143: python-django: Denial-of-service possibility by filling session store
bnc#937523
VUL-0: CVE-2015-5144: python-django: Header injection possibility since validators accept newlines in input
Selected Binaries
openSUSE Build Service is sponsored by