First published: Thu Apr 24 2025(Updated: )
Django is a high-level Python Web framework that encourages rapid<br>development and a clean, pragmatic design. It focuses on automating as much<br>as possible and adhering to the DRY (Don't Repeat Yourself) principle.<br>Security Fix(es):<br><li> Potential regular expression denial-of-service in</li> django.utils.text.Truncator.words() (CVE-2024-27351)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenStack Services on OpenShift | ||
redhat/python-django | <2.2.24-9.el9 | 2.2.24-9.el9 |
redhat/python3-django | <2.2.24-9.el9 | 2.2.24-9.el9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity level of RHSA-2025:4187 is categorized as moderate.
To fix RHSA-2025:4187, upgrade to python-django version 2.2.24-9.el9 or python3-django version 2.2.24-9.el9.
RHSA-2025:4187 addresses a potential regular expression denial of service vulnerability in Django.
The affected software versions for RHSA-2025:4187 include python-django and python3-django versions prior to 2.2.24-9.el9.
Users of Red Hat OpenStack services utilizing vulnerable versions of Django are impacted by RHSA-2025:4187.