-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4458-1                [email protected]
https://www.debian.org/lts/security/                           Chris Lamb
January 28, 2026                              https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : python-django
Version        : 2:2.2.28-1~deb11u11
CVE IDs        : CVE-2024-39614 CVE-2024-45231 CVE-2024-42005 CVE-2024-41991 
CVE-2024-39329 CVE-2024-41989 CVE-2024-39330 CVE-2025-6069

Multiple vulnerabilities were discovered in Django, the Python-based
web development framework:

- - CVE-2024-39614: Fix a potential denial-of-service in
  django.utils.translation.get_supported_language_variant. This
  method was subject to a potential DoS attack when used with very
  long strings containing specific characters. To mitigate this
  vulnerability, the language code provided to
  get_supported_language_variant is now parsed up to a maximum length
  of 500 characters.

- - CVE-2024-45231: Potential user email enumeration via response
  status on password reset. Due to unhandled email sending failures,
  the django.contrib.auth.forms.PasswordResetForm class allowed
  remote attackers to enumerate user emails by issuing password reset
  requests and observing the outcomes. To mitigate this risk,
  exceptions occurring during password reset email sending are now
  handled and logged using the django.contrib.auth logger.

- - CVE-2024-42005: Potential SQL injection in QuerySet.values() and
  values_list(). QuerySet.values() and values_list() methods on
  models with a JSONField are subject to SQL injection in column
  aliases via a crafted JSON object key as a passed *arg.

- - CVE-2024-41991: Potential denial-of-service vulnerability in
  django.utils.html.urlize() and AdminURLFieldWidget. The urlize and
  urlizetrunc template filters, and the AdminURLFieldWidget widget,
  are subject to a potential denial-of-service attack via certain
  inputs with a very large number of Unicode characters.

- - CVE-2024-39329: Avoid a username enumeration vulnerability through
  timing difference for users with unusable password. The
  authenticate method of django.contrib.auth.backends.ModelBackend
  method allowed remote attackers to enumerate users via a timing
  attack involving login requests for users with unusable passwords.

- - CVE-2024-41989: Memory exhaustion in django.utils.numberformat. The
  floatformat template filter is subject to significant memory
  consumption when given a string representation of a number in
  scientific notation with a large exponent.

- - CVE-2024-39330: Address a potential directory-traversal in
  django.core.files.storage.Storage.save. Derived classes of this
  method's base class which override generate_filename without
  replicating the file path validations existing in the parent class
  allowed for potential directory-traversal via certain inputs when
  calling save(). Built-in Storage sub-classes were not affected by
  this vulnerability.

In addition, the fix for CVE-2025-6069 in the python3.9 source
package (released as part of a suite of updates in DLA 4445-1) that
modified the html.parser.HTMLParser class in such a way that changed
the behaviour of Django's strip_tags() method in some edge cases that
were tested by Django's testsuite. As a result of this regression,
update the testsuite for the new expected results.

For Debian 11 bullseye, these problems have been fixed in version
2:2.2.28-1~deb11u11.

We recommend that you upgrade your python-django packages.

For the detailed security status of python-django please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-django

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
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=jemu
-----END PGP SIGNATURE-----

Reply via email to