stable

python-django-3.2.12-1.fc35

FEDORA-2022-e7fd530688 created by mrunge a year ago for Fedora 35

update to 3.2.12

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2022-e7fd530688

This update has been submitted for testing by mrunge.

a year ago

This update's test gating status has been changed to 'ignored'.

a year ago

This update has been pushed to testing.

a year ago

This update has been submitted for stable by bodhi.

a year ago

This update has been pushed to stable.

a year ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
a year ago
in testing
a year ago
in stable
a year ago
BZ#1961135 CVE-2021-31542 python-django: django: Potential directory-traversal via uploaded files [fedora-all]
0
0
BZ#1967410 CVE-2021-33203 python-django: django: Potential directory traversal via ``admindocs`` [fedora-all]
0
0
BZ#1967428 CVE-2021-33571 python-django: django: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses [fedora-all]
0
0
BZ#2029748 CVE-2021-44420 python-django: django: potential bypass of an upstream access control based on URL paths [fedora-all]
0
0
BZ#2037174 CVE-2021-45115 CVE-2021-45116 CVE-2021-45452 python-django: various flaws [fedora-all]
0
0
BZ#2049325 CVE-2022-23833 python-django: django: Denial-of-service possibility in file uploads [fedora-all]
0
0
BZ#2049332 CVE-2022-22818 python-django: django: Possible XSS via '{% debug %}' template tag [fedora-all]
0
0

Automated Test Results