[Git][security-tracker-team/security-tracker][master] Add upstream commit references for python-django issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Feb 3 20:03:27 GMT 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
655c4435 by Salvatore Bonaccorso at 2026-02-03T20:59:37+01:00
Add upstream commit references for python-django issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,21 +1,27 @@
 CVE-2026-1312 [Potential SQL injection via QuerySet.order_by and FilteredRelation]
 	- python-django <unfixed>
 	NOTE: https://www.djangoproject.com/weblog/2026/feb/03/security-releases/
+	NOTE: Fixed by: https://github.com/django/django/commit/90f5b10784ba5bf369caed87640e2b4394ea3314 (4.2.28)
 CVE-2026-1287 [Potential SQL injection in column aliases via control characters]
 	- python-django <unfixed>
 	NOTE: https://www.djangoproject.com/weblog/2026/feb/03/security-releases/
+	NOTE: Fixed by: https://github.com/django/django/commit/f75f8f3597e1ce351d5ac08b6ba7ebd9dadd9b5d (4.2.28)
 CVE-2026-1285 [Potential denial-of-service vulnerability in django.utils.text.Truncator HTML methods]
 	- python-django <unfixed>
 	NOTE: https://www.djangoproject.com/weblog/2026/feb/03/security-releases/
+	NOTE: Fixed by: https://github.com/django/django/commit/b40cfc6052ced26dcd8166a58ea6f841d0d2cac8 (4.2.28)
 CVE-2026-1207 [Potential SQL injection via raster lookups on PostGIS]
 	- python-django <unfixed>
 	NOTE: https://www.djangoproject.com/weblog/2026/feb/03/security-releases/
+	NOTE: Fixed by: https://github.com/django/django/commit/a14363102d98fa29b8cced578eb3a0fadaa5bcb7 (4.2.28)
 CVE-2025-14550 [Potential denial-of-service vulnerability via repeated headers when using ASGI]
 	- python-django <unfixed>
 	NOTE: https://www.djangoproject.com/weblog/2026/feb/03/security-releases/
+	NOTE: Fixed by: https://github.com/django/django/commit/f578acc8c54530fffabd52d2db654c8669b011af (4.2.28)
 CVE-2025-13473 [Username enumeration through timing difference in mod_wsgi authentication handler]
 	- python-django <unfixed>
 	NOTE: https://www.djangoproject.com/weblog/2026/feb/03/security-releases/
+	NOTE: Fixed by: https://github.com/django/django/commit/6dc23508f3395e1254c315084c7334ef81c4c09a (4.2.28)
 CVE-2026-25228 (Signal K Server is a server application that runs on a central hub in  ...)
 	NOT-FOR-US: Signal K Server
 CVE-2026-25222 (PolarLearn is a free and open-source learning program. In 0-PRERELEASE ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/655c443503ff246201d603180e4d15d68d2bb66a

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/655c443503ff246201d603180e4d15d68d2bb66a
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260203/989c0e15/attachment.htm>


More information about the debian-security-tracker-commits mailing list