[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted python-django 2:2.2.28-1~deb11u7 (source) into oldstable-security



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 05 Jun 2025 15:40:11 -0700
Source: python-django
Architecture: source
Version: 2:2.2.28-1~deb11u7
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Python Team <team+python@tracker.debian.org>
Changed-By: Chris Lamb <lamby@debian.org>
Closes: 1051226 1104872 1107282
Changes:
 python-django (2:2.2.28-1~deb11u7) bullseye-security; urgency=high
 .
   * CVE-2025-48432: Potential log injection via unescaped request path.
 .
     Django's internal HTTP response logging used request.path directly,
     allowing control characters (e.g. newlines or ANSI escape sequences) to
     be written unescaped into logs. This could enable log injection or
     forgery, letting attackers manipulate log appearance or structure,
     especially in logs processed by external systems or viewed in terminals.
     (Closes: #1107282)
 .
   * CVE-2025-32873: Denial-of-service possibility in strip_tags()
 .
     django.utils.html.strip_tags() would be slow to evaluate certain inputs
     containing large sequences of incomplete HTML tags. This function is used
     to implement the striptags template filter, which was therefore also
     vulnerable. strip_tags() now raises a SuspiciousOperation exception if it
     encounters an unusually large number of unclosed opening tags.
     (Closes: #1104872)
 .
   * CVE-2023-41164: Potential denial of service vulnerability in
     django.utils.encoding.uri_to_iri(). This method was subject to potential
     denial of service attack via certain inputs with a very large number of
     Unicode characters. (Closes: #1051226)
 .
   * CVE-2023-43665: Address a denial-of-service possibility in
     django.utils.text.Truncator.
 .
     Following the fix for CVE-2019-14232, the regular expressions used in the
     implementation of django.utils.text.Truncator’s chars() and words()
     methods (with html=True) were revised and improved. However, these
     regular expressions still exhibited linear backtracking complexity, so
     when given a very long, potentially malformed HTML input, the evaluation
     would still be slow, leading to a potential denial of service
     vulnerability.
 .
     The chars() and words() methods are used to implement the
     truncatechars_html and truncatewords_html template filters, which were
     thus also vulnerable.
 .
     The input processed by Truncator, when operating in HTML mode, has been
     limited to the first five million characters in order to avoid potential
     performance and memory issues.
 .
   * CVE-2024-24680: Potential denial-of-service in intcomma template filter.
     The intcomma template filter was subject to a potential denial-of-service
     attack when used with very long strings.
 .
   * CVE-2024-27351: Fix a potential regular expression denial-of-service
     (ReDoS) attack in django.utils.text.Truncator.words. This method (with
     html=True) and the truncatewords_html template filter were subject to a
     potential regular expression denial-of-service attack via a suitably
     crafted string. This is, in part, a follow up to CVE-2019-14232 and
     CVE-2023-43665.
Checksums-Sha1:
 3c3a02df5744afe7fc781794e2a1c4879ca1c6a0 2811 python-django_2.2.28-1~deb11u7.dsc
 046a08b5f2e54af1439bd45771707e1570966e48 52680 python-django_2.2.28-1~deb11u7.debian.tar.xz
 1b56315f21be1c51c231d13e23482c8281173de5 14326 python-django_2.2.28-1~deb11u7_amd64.buildinfo
Checksums-Sha256:
 f1ad665823c648e41198f4db2e7253eca689cafcb029a4eaf98bc1d4a9844800 2811 python-django_2.2.28-1~deb11u7.dsc
 72f95b4f95cb34c0e8f3c59c42e642b3e664533aff4efb273effcd0ddbe39a71 52680 python-django_2.2.28-1~deb11u7.debian.tar.xz
 e83db38bd58414defd6ad0a59e2c44da2f16f7a7ff74664f9f19f740983b769f 14326 python-django_2.2.28-1~deb11u7_amd64.buildinfo
Files:
 41cc50a404ba85283c4dec2f2f76d953 2811 python optional python-django_2.2.28-1~deb11u7.dsc
 85ac238a34ca99d098110056db4c7aaa 52680 python optional python-django_2.2.28-1~deb11u7.debian.tar.xz
 60b592562f9789de461b8d2e63d3e00b 14326 python optional python-django_2.2.28-1~deb11u7_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=6QrJ
-----END PGP SIGNATURE-----

Attachment: pgphxyuiuIJET.pgp
Description: PGP signature


Reply to: