stable

python-django-3.2.12-1.fc35

FEDORA-2022-e7fd530688 created by mrunge 2 years ago for Fedora 35

update to 3.2.12

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2022-e7fd530688

This update has been submitted for testing by mrunge.

2 years ago

This update's test gating status has been changed to 'ignored'.

2 years ago

This update has been pushed to testing.

2 years ago

This update has been submitted for stable by bodhi.

2 years ago

This update has been pushed to stable.

2 years ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
2 years ago
in testing
2 years ago
in stable
2 years ago
BZ#1961135 CVE-2021-31542 python-django: django: Potential directory-traversal via uploaded files [fedora-all]
0
0
BZ#1967410 CVE-2021-33203 python-django: django: Potential directory traversal via ``admindocs`` [fedora-all]
0
0
BZ#1967428 CVE-2021-33571 python-django: django: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses [fedora-all]
0
0
BZ#2029748 CVE-2021-44420 python-django: django: potential bypass of an upstream access control based on URL paths [fedora-all]
0
0
BZ#2037174 CVE-2021-45115 CVE-2021-45116 CVE-2021-45452 python-django: various flaws [fedora-all]
0
0
BZ#2049325 CVE-2022-23833 python-django: django: Denial-of-service possibility in file uploads [fedora-all]
0
0
BZ#2049332 CVE-2022-22818 python-django: django: Possible XSS via '{% debug %}' template tag [fedora-all]
0
0

Automated Test Results