Debian 10694 Published by

Debian has released security updates for several packages, including Redis and Python-Django. The Redis update addresses multiple vulnerabilities that could result in the execution of arbitrary code or denial of service and fixes these issues in version 5:7.0.15-1deb12u6 for Debian GNU/Linux 12 (Bookworm) and version 5:8.0.2-3+deb13u1 for iDebian GNU/Linux 13 (Trixie). The Python-Django update addresses two vulnerabilities, CVE-2025-59681 and CVE-2025-59682, which are potential SQL injection and partial directory-traversal issues that have been fixed in version 2:2.2.28-1deb11u9 for Debian GNU/Linux 11 (Bullseye) LTS, version 1:1.10.7-2+deb9u27 for Debian GNU/Linux 9 (Stretch) ELTS, and 1:1.11.29-1+deb10u16 for Debian GNU/Linux 10 (Buster) ELTS.

[DSA 6020-1] redis security update
[DLA 4324-1] python-django security update
ELA-1535-1 python-django security update




[SECURITY] [DSA 6020-1] redis security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6020-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 08, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : redis
CVE ID : CVE-2025-46817 CVE-2025-46818 CVE-2025-46819 CVE-2025-49844

Multiple security issues were discovered in the Lua scripting interface
of Redis, a persistent key-value database, which could result in the
execution of arbitrary code or denial of service.

For the oldstable distribution (bookworm), these problems have been fixed
in version 5:7.0.15-1~deb12u6.

For the stable distribution (trixie), these problems have been fixed in
version 5:8.0.2-3+deb13u1.

We recommend that you upgrade your redis packages.

For the detailed security status of redis please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/redis

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DLA 4324-1] python-django security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4324-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Chris Lamb
October 07, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : python-django
Version : 2:2.2.28-1~deb11u9
CVE IDs : CVE-2025-59681 CVE-2025-59682
Debian Bug : 1116979

It was discovered that there were two vulnerabilities in Django, a
popular web development framework:

* CVE-2025-59681: Fix a potential SQL injection in
QuerySet.annotate(), alias(), aggregate() and extra(). These
methods were subject to SQL injection in column aliases, using a
suitably crafted dictionary via dictionary expansion as the
**kwargs passed to these methods on MySQL and MariaDB.

* CVE-2025-59682: Fix a potential partial directory-traversal
vulnerability in archive.extract(). This function, used by
startapp --template and startproject --template allowed partial
directory-traversal via an archive with file paths sharing a
common prefix with the target directory.

For Debian 11 bullseye, these problems have been fixed in version
2:2.2.28-1~deb11u9.

We recommend that you upgrade your python-django packages.

For the detailed security status of python-django please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-django

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



ELA-1535-1 python-django security update


Package : python-django

Version : 1:1.10.7-2+deb9u27 (stretch), 1:1.11.29-1+deb10u16 (buster)

Related CVEs :
CVE-2025-59681
CVE-2025-59682

It was discovered that there were two vulnerabilities in Django, a popular web
development framework:

CVE-2025-59681: Fix a potential SQL injection in QuerySet.annotate(),
alias(), aggregate() and extra(). These methods were subject to SQL
injection in column aliases, using a suitably crafted dictionary via
dictionary expansion as the **kwargs passed to these methods on MySQL and
MariaDB.

CVE-2025-59682: Fix a potential partial directory-traversal
vulnerability in archive.extract(). This function, used by
startapp --template and startproject --template allowed partial
directory-traversal via an archive with file paths sharing a common prefix
with the target directory.


ELA-1535-1 python-django security update