|
|
Log in / Subscribe / Register

Ubuntu alert USN-8154-1 (python-django)

From:  noreply+usn-bot@canonical.com
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-8154-1] Django vulnerabilities
Date:  Tue, 07 Apr 2026 20:40:56 +0000
Message-ID:  <E1wADEG-0006KX-0B@lists.ubuntu.com>

========================================================================== Ubuntu Security Notice USN-8154-1 April 07, 2026 python-django vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in Django. Software Description: - python-django: High-level Python web development framework Details: Seokchan Yoon discovered that Django incorrectly handled copying memory when parsing multipart uploads with excessive whitespace. A remote attacker could possibly use this issue to cause Django to use excessive resources, leading to a denial of service. (CVE-2026-33033) It was discovered that Django did not enforce an upload memory size limit in the Content-Length header. A remote attacker could possibly use this issue to cause Django to use excessive resources, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-33034) Tarek Nakkouch discovered that Django incorrectly handled underscores in the ASGI headers. A remote attacker could possibly use this issue to spoof HTTP headers. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 25.10. (CVE-2026-3902) It was discovered that Django incorrectly handled verification of model data created with POST requests. A remote attacker could possibly use this issue to forge new model permissions. (CVE-2026-4277, CVE-2026-4292) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.10 python3-django 3:5.2.4-1ubuntu2.4 Ubuntu 24.04 LTS python3-django 3:4.2.11-1ubuntu1.15 Ubuntu 22.04 LTS python3-django 2:3.2.12-2ubuntu1.26 Ubuntu 20.04 LTS python3-django 2:2.2.12-1ubuntu0.29+esm8 Available with Ubuntu Pro Ubuntu 18.04 LTS python-django 1:1.11.11-1ubuntu1.21+esm15 Available with Ubuntu Pro python3-django 1:1.11.11-1ubuntu1.21+esm15 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-8154-1 CVE-2026-33033, CVE-2026-33034, CVE-2026-3902, CVE-2026-4277, CVE-2026-4292 Package Information: https://launchpad.net/ubuntu/+source/python-django/3:5.2.... https://launchpad.net/ubuntu/+source/python-django/3:4.2.... https://launchpad.net/ubuntu/+source/python-django/2:3.2....


Attachment: signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmnVawoACgkQcpJm3tlz hgGJqBAAwEStkZaWE1stnwys//DjZvQm2PMUDawwepqLNkslu0zKksIuQXwhxIE/ y/t17hSIjQWdQaralIbTVTxFfyX9Xgbo5/Gmqp81BPQulmpbIX8hZAAyk4qntUYq M/sb4jYv3dzEsZTbN0HHFsttHIxJcmXjXfKj8SXkm8nD3hIDmCGyQSmMP1q5Smc6 YleEaD4JVN9FXhqcfmpT/TPpSVgxk2LQFFOHBk9VrvKRhFmR+Oh/nblGWG71EEK+ /hkxlHCboKl4YfHgOo/VXst131zRolxF1MgwZAoURWzaZL736Pxpu61SrDYaD28E ISvyeHVZ79/vVCt2J9SZM/2nZjNezDqA6iLOt5C0G/yJAGNoccfLN9jnBojRFUhd 1s+qI4ajc6PPFdP4fTrfpKxhQ8vkOGq7VWIam7IypzJb0uuroIzZ6c/SFF8XWvgV EIto+vrVJ+W3BSY8DgBCFNRNeZAKJddI4TYp1YY7J1gedjH0LNHCc+8SynC8RbvQ nXo1+inJC/VoG2wKFt/bIurRUt1vv95qfFS3QbyIsV4TjGqYJYjlaOk4N6TeeuyD o7CorMsJSq+BE/qy0SgtfJEbDyg5qM/Z5YN0G1u/XubDBB+3isMMscUSTEtXIvAT HKCr+nLzmDe7JUUY48/YqCc/fCgNRZy7kGky/CXaKHiBifzmaHQ= =xFIg -----END PGP SIGNATURE-----


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds