Security update for python-Django
| Announcement ID: | SUSE-SU-2026:1740-1 |
|---|---|
| Release Date: | 2026-05-07T07:00:33Z |
| Rating: | moderate |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for python-Django fixes the following issues
- CVE-2026-3902: headers spoofing by exploiting an ambiguous mapping of two header variants in
ASGIRequestrequests (bsc#1261729). - CVE-2026-4277: permissions on inline model instances were not validated on submission of forged POST data in GenericInlineModelAdmin (bsc#1261731).
- CVE-2026-4292: admin changelist forms using ModelAdmin.list_editable incorrectly allowed new instances to be created via forged POST data (bsc#1261732).
- CVE-2026-5766: potential denial-of-service vulnerability in ASGI requests via file upload limit bypass (bsc#1264153).
- CVE-2026-6907: potential exposure of private data due to incorrect handling of
Vary: *inUpdateCacheMiddleware(bsc#1264152). - CVE-2026-33033: denial of service via missing or understated Content-Length header in ASGI requests (bsc#1261722).
- CVE-2026-33034: ASGI requests with a missing or understated Content-Length header could bypass the
DATA_UPLOAD_MAX_MEMORY_SIZElimit when reading HttpRequest.body (bsc#1261724). - CVE-2026-35192: session fixation via public cached pages and
SESSION_SAVE_EVERY_REQUEST(bsc#1264154).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1740=1 -
SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-1740=1
Package List:
-
openSUSE Leap 15.6 (noarch)
- python311-Django-4.2.11-150600.3.56.1
-
SUSE Package Hub 15 15-SP7 (noarch)
- python311-Django-4.2.11-150600.3.56.1
References:
- https://www.suse.com/security/cve/CVE-2026-33033.html
- https://www.suse.com/security/cve/CVE-2026-33034.html
- https://www.suse.com/security/cve/CVE-2026-35192.html
- https://www.suse.com/security/cve/CVE-2026-3902.html
- https://www.suse.com/security/cve/CVE-2026-4277.html
- https://www.suse.com/security/cve/CVE-2026-4292.html
- https://www.suse.com/security/cve/CVE-2026-5766.html
- https://www.suse.com/security/cve/CVE-2026-6907.html
- https://bugzilla.suse.com/show_bug.cgi?id=1261722
- https://bugzilla.suse.com/show_bug.cgi?id=1261724
- https://bugzilla.suse.com/show_bug.cgi?id=1261729
- https://bugzilla.suse.com/show_bug.cgi?id=1261731
- https://bugzilla.suse.com/show_bug.cgi?id=1261732
- https://bugzilla.suse.com/show_bug.cgi?id=1264152
- https://bugzilla.suse.com/show_bug.cgi?id=1264153
- https://bugzilla.suse.com/show_bug.cgi?id=1264154