Immediate Action Needed: Critical Django Vulnerabilities in Ubuntu 6888-1 Advisory
Summary
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.04 LTS - Ubuntu 23.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in Django. Software Description: - python-django: High-level Python web development framework Details: Elias Myllymäki discovered that Django incorrectly handled certain inputs with a large number of brackets. A remote attacker could possibly use this issue to cause Django to consume resources or stop responding, resulting in a denial of service. (CVE-2024-38875) It was discovered that Django incorrectly handled authenticating users with unusable passwords. A remote attacker could possibly use this issue to perform a timing attack and enumerate users. (CVE-2024-39329) Josh Schneier discovered that Django incorrectly handled file path validation when the storage class is being derived. A remote attacker could possibly use this issue to save files into arbitrary d...
Read the Full AdvisoryUpdate Instructions
The problem can be corrected by updating your system to the following package versions: Ubuntu 24.04 LTS python3-django 3:4.2.11-1ubuntu1.1 Ubuntu 23.10 python3-django 3:4.2.4-1ubuntu2.3 Ubuntu 22.04 LTS python3-django 2:3.2.12-2ubuntu1.12 Ubuntu 20.04 LTS python3-django 2:2.2.12-1ubuntu0.23 In general, a standard system update will make all the necessary changes.
References
https://ubuntu.com/security/notices/USN-6888-1
CVE-2024-38875, CVE-2024-39329, CVE-2024-39330, CVE-2024-39614
Package Information
https://launchpad.net/ubuntu/+source/python-django/3:4.2.11-1ubuntu1.1 https://launchpad.net/ubuntu/+source/python-django/3:4.2.4-1ubuntu2.3 https://launchpad.net/ubuntu/+source/python-django/2:3.2.12-2ubuntu1.12 https://launchpad.net/ubuntu/+source/python-django/2:2.2.12-1ubuntu0.23