An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The django.contrib.auth.handlers.modwsgi.check_password() function for authentication via mod_wsgi allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "1.8.7-1ubuntu5.15+esm11",
"binary_name": "python-django"
},
{
"binary_version": "1.8.7-1ubuntu5.15+esm11",
"binary_name": "python-django-common"
},
{
"binary_version": "1.8.7-1ubuntu5.15+esm11",
"binary_name": "python3-django"
}
]
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "1:1.11.11-1ubuntu1.21+esm14",
"binary_name": "python-django"
},
{
"binary_version": "1:1.11.11-1ubuntu1.21+esm14",
"binary_name": "python-django-common"
},
{
"binary_version": "1:1.11.11-1ubuntu1.21+esm14",
"binary_name": "python3-django"
}
]
}