[DSA 6020-1] redis security update
[DLA 4324-1] python-django security update
ELA-1535-1 python-django security update
[SECURITY] [DSA 6020-1] redis security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-6020-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 08, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : redis
CVE ID : CVE-2025-46817 CVE-2025-46818 CVE-2025-46819 CVE-2025-49844
Multiple security issues were discovered in the Lua scripting interface
of Redis, a persistent key-value database, which could result in the
execution of arbitrary code or denial of service.
For the oldstable distribution (bookworm), these problems have been fixed
in version 5:7.0.15-1~deb12u6.
For the stable distribution (trixie), these problems have been fixed in
version 5:8.0.2-3+deb13u1.
We recommend that you upgrade your redis packages.
For the detailed security status of redis please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/redis
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[SECURITY] [DLA 4324-1] python-django security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4324-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Chris Lamb
October 07, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : python-django
Version : 2:2.2.28-1~deb11u9
CVE IDs : CVE-2025-59681 CVE-2025-59682
Debian Bug : 1116979
It was discovered that there were two vulnerabilities in Django, a
popular web development framework:
* CVE-2025-59681: Fix a potential SQL injection in
QuerySet.annotate(), alias(), aggregate() and extra(). These
methods were subject to SQL injection in column aliases, using a
suitably crafted dictionary via dictionary expansion as the
**kwargs passed to these methods on MySQL and MariaDB.
* CVE-2025-59682: Fix a potential partial directory-traversal
vulnerability in archive.extract(). This function, used by
startapp --template and startproject --template allowed partial
directory-traversal via an archive with file paths sharing a
common prefix with the target directory.
For Debian 11 bullseye, these problems have been fixed in version
2:2.2.28-1~deb11u9.
We recommend that you upgrade your python-django packages.
For the detailed security status of python-django please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-django
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
ELA-1535-1 python-django security update
Package : python-django
Version : 1:1.10.7-2+deb9u27 (stretch), 1:1.11.29-1+deb10u16 (buster)
Related CVEs :
CVE-2025-59681
CVE-2025-59682
It was discovered that there were two vulnerabilities in Django, a popular web
development framework:
CVE-2025-59681: Fix a potential SQL injection in QuerySet.annotate(),
alias(), aggregate() and extra(). These methods were subject to SQL
injection in column aliases, using a suitably crafted dictionary via
dictionary expansion as the **kwargs passed to these methods on MySQL and
MariaDB.
CVE-2025-59682: Fix a potential partial directory-traversal
vulnerability in archive.extract(). This function, used by
startapp --template and startproject --template allowed partial
directory-traversal via an archive with file paths sharing a common prefix
with the target directory.
ELA-1535-1 python-django security update