Lucene search

K
mageiaGentoo FoundationMGASA-2022-0281
HistoryAug 13, 2022 - 5:32 a.m.

Updated python-django packages fix security vulnerability

2022-08-1305:32:35
Gentoo Foundation
advisories.mageia.org
134

0.184 Low

EPSS

Percentile

96.2%

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected. (CVE-2022-34265) An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input. (CVE-2022-36359)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchpython-django< 3.2.15-1python-django-3.2.15-1.mga8