[Python-modules-team] Bug#950581: marked as done (python-django: CVE-2020-7471: Potential SQL injection via StringAgg(delimiter))

Debian Bug Tracking System owner at bugs.debian.org
Tue Feb 25 19:51:08 GMT 2020


Your message dated Tue, 25 Feb 2020 19:49:33 +0000
with message-id <E1j6gCz-000FOu-Gv at fasolo.debian.org>
and subject line Bug#950581: fixed in python-django 1:1.10.7-2+deb9u8
has caused the Debian Bug report #950581,
regarding python-django: CVE-2020-7471: Potential SQL injection via StringAgg(delimiter)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)


-- 
950581: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950581
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Salvatore Bonaccorso <carnil at debian.org>
Subject: python-django: CVE-2020-7471: Potential SQL injection via StringAgg(delimiter)
Date: Mon, 03 Feb 2020 20:54:38 +0100
Size: 2743
URL: <http://alioth-lists.debian.net/pipermail/python-modules-team/attachments/20200225/523427e5/attachment-0002.mht>
-------------- next part --------------
An embedded message was scrubbed...
From: Debian FTP Masters <ftpmaster at ftp-master.debian.org>
Subject: Bug#950581: fixed in python-django 1:1.10.7-2+deb9u8
Date: Tue, 25 Feb 2020 19:49:33 +0000
Size: 7749
URL: <http://alioth-lists.debian.net/pipermail/python-modules-team/attachments/20200225/523427e5/attachment-0003.mht>


More information about the Python-modules-team mailing list