-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 22 Jan 2026 14:39:14 -0800
Source: python-django
Architecture: source
Version: 2:2.2.28-1~deb11u11
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Python Team <[email protected]>
Changed-By: Chris Lamb <[email protected]>
Changes:
 python-django (2:2.2.28-1~deb11u11) bullseye-security; urgency=high
 .
   * Non-maintainer upload by the LTS security team.
   * CVE-2024-39614: Fix a potential denial-of-service in
     django.utils.translation.get_supported_language_variant. This method was
     subject to a potential DoS attack when used with very long strings
     containing specific characters. To mitigate this vulnerability, the
     language code provided to get_supported_language_variant is now parsed up
     to a maximum length of 500 characters.
   * CVE-2024-45231: Potential user email enumeration via response status on
     password reset. Due to unhandled email sending failures, the
     django.contrib.auth.forms.PasswordResetForm class allowed remote
     attackers to enumerate user emails by issuing password reset requests and
     observing the outcomes. To mitigate this risk, exceptions occurring
     during password reset email sending are now handled and logged using the
     django.contrib.auth logger.
   * CVE-2024-42005: Potential SQL injection in QuerySet.values() and
     values_list(). QuerySet.values() and values_list() methods on models with a
     JSONField are subject to SQL injection in column aliases via a crafted JSON
     object key as a passed *arg.
   * CVE-2024-41991: Potential denial-of-service vulnerability in
     django.utils.html.urlize() and AdminURLFieldWidget. The urlize and
     urlizetrunc template filters, and the AdminURLFieldWidget widget, are
     subject to a potential denial-of-service attack via certain inputs with a
     very large number of Unicode characters.
   * CVE-2024-39329: Avoid a username enumeration vulnerability through timing
     difference for users with unusable password. The authenticate method of
     django.contrib.auth.backends.ModelBackend method allowed remote attackers
     to enumerate users via a timing attack involving login requests for users
     with unusable passwords.
   * CVE-2024-41989: Memory exhaustion in django.utils.numberformat. The
     floatformat template filter is subject to significant memory
     consumption when given a string representation of a number in scientific
     notation with a large exponent.
   * CVE-2024-39330: Address a potential directory-traversal in
     django.core.files.storage.Storage.save. Derived classes of this method's
     base class which override generate_filename without replicating the file
     path validations existing in the parent class allowed for potential
     directory-traversal via certain inputs when calling save(). Built-in
     Storage sub-classes were not affected by this vulnerability.
   * The fix for CVE-2025-6069 in the python3.9 source package (released
     as part of a suite of updates in DLA 4445-1) that modified the
     html.parser.HTMLParser class in such a way that changed the behaviour of
     Django's strip_tags() method in some edge cases that were tested by
     Django's testsuite. As a result of this regression, update the testsuite
     for the new expected results.
Checksums-Sha1:
 d4addc5be525674992f25126e833c4c56a0366a0 2842 
python-django_2.2.28-1~deb11u11.dsc
 0661bddaeca016d84abc4c808c1c677cd7d4aa7b 9187543 
python-django_2.2.28.orig.tar.gz
 53930c9bc68cd16f4ae5c843a55d0156a829b126 64544 
python-django_2.2.28-1~deb11u11.debian.tar.xz
 ff38e36e71702d65d9687f6681da60c34197bdef 6992 
python-django_2.2.28-1~deb11u11_source.buildinfo
Checksums-Sha256:
 fea9e589c47c34aacb2e8a607066b795ba7703b855260050710e78977046259f 2842 
python-django_2.2.28-1~deb11u11.dsc
 0200b657afbf1bc08003845ddda053c7641b9b24951e52acd51f6abda33a7413 9187543 
python-django_2.2.28.orig.tar.gz
 ce1cab25d45d0b2dc3411c71f28ac729832b79f41638f03b62835adfb586faa0 64544 
python-django_2.2.28-1~deb11u11.debian.tar.xz
 56d8bc00db35bfb4e33c0370b01ad41df2adf02c6c87922ed0d80c93cc1473ab 6992 
python-django_2.2.28-1~deb11u11_source.buildinfo
Files:
 67c4116058b95dc34e56920820c7742e 2842 python optional 
python-django_2.2.28-1~deb11u11.dsc
 62550f105ef66ac7d08e0126f457578a 9187543 python optional 
python-django_2.2.28.orig.tar.gz
 3b672187f972bae2d5d7f5284c08edff 64544 python optional 
python-django_2.2.28-1~deb11u11.debian.tar.xz
 c4291ce3cae636e785acd2fddf7ca636 6992 python optional 
python-django_2.2.28-1~deb11u11_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=eLjH
-----END PGP SIGNATURE-----

Attachment: pgpBmC5YdgPIx.pgp
Description: PGP signature

Reply via email to