Bug 54035 - sqlalchemy: Multiple issues (4.4)
sqlalchemy: Multiple issues (4.4)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.4
All Linux
: P3 normal (vote)
: UCS 4.4-8-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-11-08 08:10 CET by Quality Assurance
Modified: 2021-11-10 17:52 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 7.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2021-11-08 08:10:42 CET
New Debian sqlalchemy 1.0.15+ds1-1+deb9u1 fixes:
This update addresses the following issues:
* SQL Injection when the order_by parameter can be controlled (CVE-2019-7164)
* SQL Injection when the group_by parameter can be controlled (CVE-2019-7548)
Comment 1 Quality Assurance univentionstaff 2021-11-08 09:00:05 CET
--- mirror/ftp/4.3/unmaintained/4.3-0/source/sqlalchemy_1.0.15+ds1-1.dsc
+++ apt/ucs_4.4-0-errata4.4-8/source/sqlalchemy_1.0.15+ds1-1+deb9u1.dsc
@@ -1,3 +1,14 @@
+1.0.15+ds1-1+deb9u1 [Sat, 06 Nov 2021 22:27:44 +0100] Markus Koschany <apo@debian.org>:
+
+  * Non-maintainer upload by the LTS team.
+  * Fix CVE-2019-7164 and CVE-2019-7548:
+    Two SQL injection vulnerabilities were discovered in SQLAlchemy, an SQL
+    toolkit and Object Relational Mapper for Python, when the order_by or
+    group_by parameters can be controlled by an attacker.
+    Warning: The text coercion feature of SQLAlchemy is rarely used but the
+    warning that has been previously emitted is now an ArgumentError or in case
+    of the order_by() and group_by() parameters a CompileError.
+
 1.0.15+ds1-1 [Tue, 20 Sep 2016 21:44:37 +0200] Piotr Ożarowski <piotr@debian.org>:
 
   * New upstream version

<http://piuparts.knut.univention.de/4.4-8/#5834702157873464034>
Comment 2 Philipp Hahn univentionstaff 2021-11-08 10:22:39 CET
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts