Package: python-django
Version: 2:2.2.28-1~deb11u12
X-Debbugs-CC: [email protected]
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for python-django.

CVE-2026-3902[0]:
| An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and
| 4.2 before 4.2.30. `ASGIRequest` allows a remote attacker to spoof
| headers by exploiting an ambiguous mapping of two header variants
| (with hyphens or with underscores) to a single version with
| underscores. Earlier, unsupported Django series (such as 5.0.x,
| 4.1.x, and 3.2.x) were not evaluated and may also be affected.
| Django would like to thank Tarek Nakkouch for reporting this issue.


CVE-2026-4277[1]:
| An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and
| 4.2 before 4.2.30. Add permissions on inline model instances were
| not validated on submission of  forged `POST` data in
| `GenericInlineModelAdmin`. Earlier, unsupported Django series (such
| as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be
| affected. Django would like to thank N05ec@LZU-DSLab for reporting
| this issue.


CVE-2026-4292[2]:
| An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and
| 4.2 before 4.2.30. Admin changelist forms using
| `ModelAdmin.list_editable` incorrectly allowed new  instances to be
| created via forged `POST` data. Earlier, unsupported Django series
| (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be
| affected. Django would like to thank Cantina for reporting this
| issue.


CVE-2026-33033[3]:
| An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and
| 4.2 before 4.2.30. `MultiPartParser` allows remote attackers to
| degrade performance by submitting multipart uploads with `Content-
| Transfer-Encoding: base64` including excessive whitespace. Earlier,
| unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not
| evaluated and may also be affected. Django would like to thank
| Seokchan Yoon for reporting this issue.


CVE-2026-33034[4]:
| An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and
| 4.2 before 4.2.30. ASGI requests with a missing or understated
| `Content-Length` header could  bypass the
| `DATA_UPLOAD_MAX_MEMORY_SIZE` limit when reading
| `HttpRequest.body`, allowing remote attackers to load an unbounded
| request body into  memory. Earlier, unsupported Django series (such
| as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be
| affected. Django would like to thank Superior for reporting this
| issue.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

   https://www.djangoproject.com/weblog/2026/apr/07/security-releases/

and:

[0] https://security-tracker.debian.org/tracker/CVE-2026-3902
    https://www.cve.org/CVERecord?id=CVE-2026-3902
[1] https://security-tracker.debian.org/tracker/CVE-2026-4277
    https://www.cve.org/CVERecord?id=CVE-2026-4277
[2] https://security-tracker.debian.org/tracker/CVE-2026-4292
    https://www.cve.org/CVERecord?id=CVE-2026-4292
[3] https://security-tracker.debian.org/tracker/CVE-2026-33033
    https://www.cve.org/CVERecord?id=CVE-2026-33033
[4] https://security-tracker.debian.org/tracker/CVE-2026-33034
    https://www.cve.org/CVERecord?id=CVE-2026-33034


Regards,

-- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      [email protected] / chris-lamb.co.uk
       `-

Reply via email to