Debian alert DLA-4324-1 (python-django)
| From: | Chris Lamb <lamby@debian.org> | |
| To: | debian-lts-announce@lists.debian.org | |
| Subject: | [SECURITY] [DLA 4324-1] python-django security update | |
| Date: | Wed, 08 Oct 2025 10:19:54 -0700 | |
| Message-ID: | <175987797015.159391.16315000370058040306@bigcat> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-4324-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Chris Lamb October 07, 2025 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : python-django Version : 2:2.2.28-1~deb11u9 CVE IDs : CVE-2025-59681 CVE-2025-59682 Debian Bug : 1116979 It was discovered that there were two vulnerabilities in Django, a popular web development framework: * CVE-2025-59681: Fix a potential SQL injection in QuerySet.annotate(), alias(), aggregate() and extra(). These methods were subject to SQL injection in column aliases, using a suitably crafted dictionary via dictionary expansion as the **kwargs passed to these methods on MySQL and MariaDB. * CVE-2025-59682: Fix a potential partial directory-traversal vulnerability in archive.extract(). This function, used by startapp --template and startproject --template allowed partial directory-traversal via an archive with file paths sharing a common prefix with the target directory. For Debian 11 bullseye, these problems have been fixed in version 2:2.2.28-1~deb11u9. We recommend that you upgrade your python-django packages. For the detailed security status of python-django please refer to its security tracker page at: https://security-tracker.debian.org/tracker/python-django Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmjlm1AACgkQHpU+J9Qx Hli0mRAAvCLys2/U/XKCTmH44NVtJM83/jwb3wG0c6Q83Wt9Jso/9JC5753lz9LV GlB1t1jDYa+sT/Nta7A6kgv8+w1LBJqZtc7sg3JUBiqw6efva1yHEi4byqy2hg7j XFnKnI73I7dMHbMXkmcBpPC4xAwOpSJ5Fw5WWxLgUe+6h7Nvf02ILHaG30NBwZsQ 3UEsazyitIbwFm3/e0Kk1tCjUhmXFEQBn5ao8wp6FoOvKhon9FI2cmi0K0Hsr2kd n3MA0jZqH7VZCXScWV8xGP7bes9PkGqXKhHduu4Fd2J3y8pZZ8qq63aBmHLfwLdL Ria2GsyhmrDFlZP97deuIFzrGZbCZzkcZs6wVHAgMRt/fgqpvqirb70sJpwU8lHs t55v1hJ5q9B9qcvUYCyg2fQyGj2ARffre4t/OOVblsYnwUjO7IMLeDwC8n2xhYGd aRbsl9Gu+8mi8uo5Ff0QfPGn6LyCLsFde/xxhx6WbXCAaBLKmNwtLk8igXs83k8U +wtv+6p88Q5UHAFhaZUeAf5RLaukibASlANhLCSvMioU8YqOzG7FBwllsanwHuwW dCYpISRJqj1D9VJCmH196Uc+AgBHmAqhPyguB9qs/0vUIhuGgyBfpnvu/otp9FvR EQXLPEh2QH938s7rZ46adgBTx3xjZVDfTppihj1ca4dekYAhQfc= =b91c -----END PGP SIGNATURE-----
