mirror of
https://github.com/openembedded/meta-openembedded.git
synced 2026-01-27 12:01:38 +01:00
The methods QuerySet.filter(), QuerySet.exclude(), and QuerySet.get(), and the
class Q() were subject to SQL injection when using a suitably crafted
dictionary, with dictionary expansion, as the _connector argument.
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2025-64459
https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html
Upstream-patch:
|
||
|---|---|---|
| .. | ||
| CVE-2023-23969.patch | ||
| CVE-2023-31047.patch | ||
| CVE-2023-36053.patch | ||
| CVE-2023-41164.patch | ||
| CVE-2023-43665.patch | ||
| CVE-2023-46695.patch | ||
| CVE-2024-24680.patch | ||
| CVE-2024-27351.patch | ||
| CVE-2024-38875.patch | ||
| CVE-2024-39329.patch | ||
| CVE-2024-39330.patch | ||
| CVE-2024-39614.patch | ||
| CVE-2024-41989-0001.patch | ||
| CVE-2024-41989-0002.patch | ||
| CVE-2024-41989-0003.patch | ||
| CVE-2024-41989-0004.patch | ||
| CVE-2024-41990.patch | ||
| CVE-2024-41991.patch | ||
| CVE-2024-42005.patch | ||
| CVE-2024-45230.patch | ||
| CVE-2024-45231.patch | ||
| CVE-2024-53907.patch | ||
| CVE-2024-56374.patch | ||
| CVE-2025-26699.patch | ||
| CVE-2025-32873.patch | ||
| CVE-2025-57833.patch | ||
| CVE-2025-64459.patch | ||