[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 4324-1] python-django security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4324-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
October 07, 2025                              https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : python-django
Version        : 2:2.2.28-1~deb11u9
CVE IDs        : CVE-2025-59681 CVE-2025-59682
Debian Bug     : 1116979

It was discovered that there were two vulnerabilities in Django, a
popular web development framework:

 * CVE-2025-59681: Fix a potential SQL injection in
   QuerySet.annotate(), alias(), aggregate() and extra(). These
   methods were subject to SQL injection in column aliases, using a
   suitably crafted dictionary via dictionary expansion as the
   **kwargs passed to these methods on MySQL and MariaDB.

 * CVE-2025-59682: Fix a potential partial directory-traversal
   vulnerability in archive.extract(). This function, used by
   startapp --template and startproject --template allowed partial
   directory-traversal via an archive with file paths sharing a
   common prefix with the target directory.

For Debian 11 bullseye, these problems have been fixed in version
2:2.2.28-1~deb11u9.

We recommend that you upgrade your python-django packages.

For the detailed security status of python-django please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-django

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
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=b91c
-----END PGP SIGNATURE-----


Reply to: