OESA-2025-2788

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2788
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2788.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-2788
Upstream
Published
2025-12-05T13:12:34Z
Modified
2025-12-05T13:33:11.181605Z
Summary
python-django security update
Details

A high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Security Fix(es):

An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4.2 before 4.2.27. Algorithmic complexity in django.core.serializers.xml_serializer.getInnerText() allows a remote attacker to cause a potential denial-of-service attack triggering CPU and memory exhaustion via specially crafted XML input processed by the XML Deserializer. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.(CVE-2025-64460)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS-SP2 / python-django

Package

Name
python-django
Purl
pkg:rpm/openEuler/python-django&distro=openEuler-24.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.15-11.oe2403sp2

Ecosystem specific

{
    "noarch": [
        "python-django-help-4.2.15-11.oe2403sp2.noarch.rpm",
        "python3-Django-4.2.15-11.oe2403sp2.noarch.rpm"
    ],
    "src": [
        "python-django-4.2.15-11.oe2403sp2.src.rpm"
    ]
}

Database specific

source

"https://repo.openeuler.org/security/data/osv/OESA-2025-2788.json"