|
|
Log in / Subscribe / Register

Ubuntu alert USN-8009-1 (python-django)

From:  noreply+usn-bot@canonical.com
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-8009-1] Django vulnerabilities
Date:  Tue, 03 Feb 2026 19:14:08 +0000
Message-ID:  <E1vnLqi-0007vW-Oy@lists.ubuntu.com>

========================================================================== Ubuntu Security Notice USN-8009-1 February 03, 2026 python-django vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Several security issues were fixed in Django. Software Description: - python-django: High-level Python web development framework Details: It was discovered that Django exposed timing information when checking passwords. An attacker could possibly use this issue to obtain sensitive information. (CVE-2025-13473) Jiyong Yang discovered that Django incorrectly handled malformed requests with duplicate headers. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 25.10. (CVE-2025-14550) Tarek Nakkouch discovered that Django incorrectly parsed raster lookups. An attacker could possibly use this issue to perform SQL injection attacks. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 25.10. (CVE-2026-1207) Seokchan Yoon discovered that Django incorrectly handled malformed HTML inputs containing a large amount of unmatched HTML end tags. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 25.10. (CVE-2026-1285) Solomon Kebede discovered that Django incorrectly handled control characters in the dictionary expansion of certain QuerySet methods. An attacker could possibly use this issue to perform SQL injection attacks. (CVE-2026-1287) Solomon Kebede discovered that Django incorrectly handled column alias parsing with dictionary expansion. An attacker could possibly use this issue to perform SQL injection attacks. This issue only affected Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-1312) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.10 python3-django 3:5.2.4-1ubuntu2.3 Ubuntu 24.04 LTS python3-django 3:4.2.11-1ubuntu1.14 Ubuntu 22.04 LTS python3-django 2:3.2.12-2ubuntu1.25 Ubuntu 20.04 LTS python3-django 2:2.2.12-1ubuntu0.29+esm7 Available with Ubuntu Pro Ubuntu 18.04 LTS python-django 1:1.11.11-1ubuntu1.21+esm14 Available with Ubuntu Pro python3-django 1:1.11.11-1ubuntu1.21+esm14 Available with Ubuntu Pro Ubuntu 16.04 LTS python-django 1.8.7-1ubuntu5.15+esm11 Available with Ubuntu Pro python3-django 1.8.7-1ubuntu5.15+esm11 Available with Ubuntu Pro Ubuntu 14.04 LTS python-django 1.6.11-0ubuntu1.3+esm10 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-8009-1 CVE-2025-13473, CVE-2025-14550, CVE-2026-1207, CVE-2026-1285, CVE-2026-1287, CVE-2026-1312 Package Information: https://launchpad.net/ubuntu/+source/python-django/3:5.2.... https://launchpad.net/ubuntu/+source/python-django/3:4.2.... https://launchpad.net/ubuntu/+source/python-django/2:3.2....


Attachment: signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmmCSEgACgkQcpJm3tlz hgFewA//ZwmSvSMsYO1nTOaa5EUsPGiLrp+Terd8t/2R2L8jhxSBG+H/sVrFAE3d 7cc5o/BwpGVQNJzxsGqjMbVi/IIaTcRhdmQ9M5LyUhHU9wfiDl55Jp3e711vuyRe i1weJdFZdHRoUkm8pSg+QbPkjo2WFsXgJVzI6gW9WPbvRofZ2rgCplBtIdD/kmUm CdKxEFek8YYqptEQBn4eh6EIhFBSattHyrlWnW/LiRWD7w0NyYYSfzAUZt2kttim 7MS8OIcyOQQxKCXcmcyB3nq0dhRXjJPogy3tcuXh+s1u4wk4SK9HgL3U0Mc1miCW GlsrWWHRhHB9vc/CvO27u3u+lJYYcUE38QbWTyHisgmrvPZYH/EE25sae74YsVI8 /0k+lTWI3inrOq+sfOYeWg9l4NAGC1Gk6cvpyeis/vG089L+tU+cU2LbACZTeqfr KvHSV5j+hKysbZb9NBhkjO058SkhgbGkde4fIa5oPAy/4FXKIuq4R43po3hcoiez fCJpNIMyJBYnVoSqWOoI94jXkLoV4IeuSJ+yME/0gC6OPzDO97pZWlchMafS3Stt VYbenmP5vyQYJ56zLLk4jlZDwUblja9PHBmJZOZcELLc9F/UdAw+pq6xhjCKFMfU 2c6PFyaCqZjfwUKm5ayVaIPki4kvHtJJM18XqSlbdi8aSKYVu4g= =o0Az -----END PGP SIGNATURE-----


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds