File _patchinfo of Package patchinfo.40845
<patchinfo incident="40845">
<issue tracker="cve" id="2025-59681"/>
<issue tracker="cve" id="2025-59682"/>
<issue tracker="bnc" id="1250485">VUL-0: EMBARGOED: CVE-2025-59681: python-Django,python-Django4: Potential SQL injection in QuerySet.annotate(), alias(), aggregate(), and extra() on MySQL and MariaDB</issue>
<issue tracker="bnc" id="1250487">VUL-0: EMBARGOED: CVE-2025-59682: python-Django,python-Django4: Potential partial directory-traversal via archive.extract()</issue>
<packager>mcalabkova</packager>
<rating>critical</rating>
<category>security</category>
<summary>Security update for python-Django</summary>
<description>This update for python-Django fixes the following issues:
- CVE-2025-59681: SQL injection via the `QuerySet` annotate()`, `alias()`, `aggregate()`, or `extra()` methods when
processing a specially crafted dictionary with dictionary expansion (bsc#1250485).
- CVE-2025-59682: directory traversal via the `django.utils.archive.extract()` function when processing an archive with
file paths that share a common prefix with the target directory (bsc#1250487).
</description>
</patchinfo>