Package: python-django
Version: 2:2.2.28-1~deb11u12
X-Debbugs-CC: [email protected]
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for python-django via

   https://www.djangoproject.com/weblog/2026/mar/03/security-releases/


CVE-2026-25673[0]:
| An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and
| 4.2 before 4.2.29. `URLField.to_python()` in Django calls
| `urllib.parse.urlsplit()`, which performs NFKC normalization on
| Windows that is disproportionately slow for certain Unicode
| characters, allowing a remote attacker to cause denial of service
| via large URL inputs containing these characters. Earlier,
| unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not
| evaluated and may also be affected. Django would like to thank
| Seokchan Yoon for reporting this issue.


CVE-2026-25674[1]:
| An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and
| 4.2 before 4.2.29. Race condition in file-system storage and file-
| based cache backends in Django allows an attacker to cause file
| system objects to be created with incorrect permissions via
| concurrent requests, where one thread's temporary `umask` change
| affects other threads in multi-threaded environments. Earlier,
| unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not
| evaluated and may also be affected. Django would like to thank Tarek
| Nakkouch for reporting this issue.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-25673
    https://www.cve.org/CVERecord?id=CVE-2026-25673
[1] https://security-tracker.debian.org/tracker/CVE-2026-25674
    https://www.cve.org/CVERecord?id=CVE-2026-25674


Regards,

-- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      [email protected] / chris-lamb.co.uk
       `-

Reply via email to