|
|
Log in / Subscribe / Register

Debian alert DLA-4458-1 (python-django)

From:  Chris Lamb <lamby@debian.org>
To:  debian-lts-announce@lists.debian.org
Subject:  [SECURITY] [DLA 4458-1] python-django security update
Date:  Wed, 28 Jan 2026 13:46:32 -0800
Message-ID:  <176963567384.1537070.6239379633048755433@bigcat>

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-4458-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Chris Lamb January 28, 2026 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : python-django Version : 2:2.2.28-1~deb11u11 CVE IDs : CVE-2024-39614 CVE-2024-45231 CVE-2024-42005 CVE-2024-41991 CVE-2024-39329 CVE-2024-41989 CVE-2024-39330 CVE-2025-6069 Multiple vulnerabilities were discovered in Django, the Python-based web development framework: - - CVE-2024-39614: Fix a potential denial-of-service in django.utils.translation.get_supported_language_variant. This method was subject to a potential DoS attack when used with very long strings containing specific characters. To mitigate this vulnerability, the language code provided to get_supported_language_variant is now parsed up to a maximum length of 500 characters. - - CVE-2024-45231: Potential user email enumeration via response status on password reset. Due to unhandled email sending failures, the django.contrib.auth.forms.PasswordResetForm class allowed remote attackers to enumerate user emails by issuing password reset requests and observing the outcomes. To mitigate this risk, exceptions occurring during password reset email sending are now handled and logged using the django.contrib.auth logger. - - CVE-2024-42005: Potential SQL injection in QuerySet.values() and values_list(). QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg. - - CVE-2024-41991: Potential denial-of-service vulnerability in django.utils.html.urlize() and AdminURLFieldWidget. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. - - CVE-2024-39329: Avoid a username enumeration vulnerability through timing difference for users with unusable password. The authenticate method of django.contrib.auth.backends.ModelBackend method allowed remote attackers to enumerate users via a timing attack involving login requests for users with unusable passwords. - - CVE-2024-41989: Memory exhaustion in django.utils.numberformat. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent. - - CVE-2024-39330: Address a potential directory-traversal in django.core.files.storage.Storage.save. Derived classes of this method's base class which override generate_filename without replicating the file path validations existing in the parent class allowed for potential directory-traversal via certain inputs when calling save(). Built-in Storage sub-classes were not affected by this vulnerability. In addition, the fix for CVE-2025-6069 in the python3.9 source package (released as part of a suite of updates in DLA 4445-1) that modified the html.parser.HTMLParser class in such a way that changed the behaviour of Django's strip_tags() method in some edge cases that were tested by Django's testsuite. As a result of this regression, update the testsuite for the new expected results. For Debian 11 bullseye, these problems have been fixed in version 2:2.2.28-1~deb11u11. We recommend that you upgrade your python-django packages. For the detailed security status of python-django please refer to its security tracker page at: https://security-tracker.debian.org/tracker/python-django Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAml6f1YACgkQHpU+J9Qx Hlh3wg//Vcy3/gJZGRcefJrAlZ71imfhWkacNOcoM9Ua9BwZtki9XpF67VddmPw3 BgnWacknSvvl8zQAciUzdrjh2lro5+k0O6faO7GKeLZbXCUk1Sa533ETAS2vadhJ rY3YFKBgihyaotTyeQ7o8De6XaECrJXgfs1BaIbfd9nA9429f/3QhCiR8Db5MjxP bEGw1ULhdJTlJ/btgYpdJpK1fWcjFJ3gXnfieVnTFtSBLuC/auFkkvRT7OIMPNHV 6DiNu9GmmzuWjBbN+R3SukmGTQV6mSwFOptEP8iRop4syfN1ger+dxZWmxMf3O+r i6YfxkVUsfahS7OPfhagbV6ww/Ec5lAuQJajDjgNXqFGcYUUhKDka2k4El6KmgXA jM8UrV79d/HuOZ1/Alif2Vo6nrprWtViCBxHVkMgQzONwr8IPEXUQBcDvzFbFspj KLvnT6nGLmz86KEppKicfyUWYgPBHw8dGk9lDXL4iXnNT6x1AKVhGQBRm9dm6bsd dJYKlMpwSWWZxHIZxgRS6df6EDXNvbwanyXqWyGkuP8UrwjhKMauzG4foy/vmSkO bSVtnDk8InPkHn0zEABrBkbM0TBzSyQF7/KwX88hDjXQ7kbyQDxBHZcSxdaoY1c1 KPhoZIVF/9c5L1aecMgUVoKOwuy4Y0I5QwynUsPwGXk+kmwlY2s= =jemu -----END PGP SIGNATURE-----


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds