meta-openembedded/meta-python/recipes-devtools/python/python3-django_2.2.28.bb
Haixiao Yan 0d50915759 python3-django: fix CVE-2025-64459
The methods QuerySet.filter(), QuerySet.exclude(), and QuerySet.get(), and the
class Q() were subject to SQL injection when using a suitably crafted
dictionary, with dictionary expansion, as the _connector argument.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2025-64459
https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html

Upstream-patch:
98e642c691

Signed-off-by: Haixiao Yan <haixiao.yan.cn@windriver.com>
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-12-18 09:10:52 +01:00

42 lines
1.4 KiB
BlitzBasic

require python-django.inc
# Pin to 2.2.x LTS releases ONLY for this recipe
UPSTREAM_CHECK_REGEX = "/${PYPI_PACKAGE}/(?P<pver>(2\.2\.\d*)+)/"
inherit setuptools3
SRC_URI += "file://CVE-2023-31047.patch \
file://CVE-2023-36053.patch \
file://CVE-2023-41164.patch \
file://CVE-2023-43665.patch \
file://CVE-2023-46695.patch \
file://CVE-2024-24680.patch \
file://CVE-2024-42005.patch \
file://CVE-2024-38875.patch \
file://CVE-2023-23969.patch \
file://CVE-2024-39614.patch \
file://CVE-2024-41989-0001.patch \
file://CVE-2024-41989-0002.patch \
file://CVE-2024-41989-0003.patch \
file://CVE-2024-41989-0004.patch \
file://CVE-2024-41990.patch \
file://CVE-2024-41991.patch \
file://CVE-2024-45230.patch \
file://CVE-2024-45231.patch \
file://CVE-2024-53907.patch \
file://CVE-2024-27351.patch \
file://CVE-2025-26699.patch \
file://CVE-2024-56374.patch \
file://CVE-2025-57833.patch \
file://CVE-2024-39329.patch \
file://CVE-2024-39330.patch \
file://CVE-2025-32873.patch \
file://CVE-2025-64459.patch \
"
SRC_URI[sha256sum] = "0200b657afbf1bc08003845ddda053c7641b9b24951e52acd51f6abda33a7413"
RDEPENDS:${PN} += "\
${PYTHON_PN}-sqlparse \
"