File _patchinfo of Package patchinfo.34948

<patchinfo incident="34948">
  <issue tracker="cve" id="2024-41990"/>
  <issue tracker="cve" id="2024-41989"/>
  <issue tracker="cve" id="2022-28346"/>
  <issue tracker="cve" id="2024-41991"/>
  <issue tracker="cve" id="2024-42005"/>
  <issue tracker="cve" id="2019-12308"/>
  <issue tracker="bnc" id="1228630">VUL-0: EMBARGOED: CVE-2024-41990: python-Django,python-Django1,python-Django4: Potential denial-of-service vulnerability in django.utils.html.urlize()</issue>
  <issue tracker="bnc" id="1228631">VUL-0: EMBARGOED: CVE-2024-41991: python-Django,python-Django1,python-Django4: Potential denial-of-service vulnerability in django.utils.html.urlize() and AdminURLFieldWidget</issue>
  <issue tracker="bnc" id="1228632">VUL-0: EMBARGOED: CVE-2024-42005: python-Django,python-Django1,python-Django4: Potential SQL injection in QuerySet.values() and values_list()</issue>
  <issue tracker="bnc" id="1228629">VUL-0: EMBARGOED: CVE-2024-41989: python-Django,python-Django1,python-Django4: Memory exhaustion in django.utils.numberformat.floatformat()</issue>
  <issue tracker="bnc" id="1198398">VUL-0: CVE-2022-28346: python-Django,python-Django1: Potential SQL injection in QuerySet.annotate(),aggregate() and extra()</issue>
  <issue tracker="bnc" id="1136468">VUL-0: CVE-2019-12308: python-Django, python-Django1 : The clickable "Current URL" link generated by AdminURLFieldWidget displays the provided value without validating it as a safe</issue>
  <packager>mcalabkova</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for python-Django</summary>
  <description>This update for python-Django fixes the following issues:

- CVE-2024-42005: Fixed SQL injection in QuerySet.values() and values_list() (bsc#1228629)
- CVE-2024-41989: Fixed Memory exhaustion in django.utils.numberformat.floatformat() (bsc#1228630)
- CVE-2024-41990: Fixed denial-of-service vulnerability in django.utils.html.urlize() (bsc#1228631)
- CVE-2024-41991: Fixed another denial-of-service vulnerability in django.utils.html.urlize() (bsc#1228632)
- CVE-2022-28346: Fixed SQL injection in QuerySet.annotate(),aggregate() and extra() (bsc#1198398)
- CVE-2019-12308: Fixed XSS in AdminURLFieldWidget (bsc#1136468)
</description>
</patchinfo>
openSUSE Build Service is sponsored by