Univention Bugzilla – Bug 54035
sqlalchemy: Multiple issues (4.4)
Last modified: 2021-11-10 17:52:45 CET
New Debian sqlalchemy 1.0.15+ds1-1+deb9u1 fixes: This update addresses the following issues: * SQL Injection when the order_by parameter can be controlled (CVE-2019-7164) * SQL Injection when the group_by parameter can be controlled (CVE-2019-7548)
--- mirror/ftp/4.3/unmaintained/4.3-0/source/sqlalchemy_1.0.15+ds1-1.dsc +++ apt/ucs_4.4-0-errata4.4-8/source/sqlalchemy_1.0.15+ds1-1+deb9u1.dsc @@ -1,3 +1,14 @@ +1.0.15+ds1-1+deb9u1 [Sat, 06 Nov 2021 22:27:44 +0100] Markus Koschany <apo@debian.org>: + + * Non-maintainer upload by the LTS team. + * Fix CVE-2019-7164 and CVE-2019-7548: + Two SQL injection vulnerabilities were discovered in SQLAlchemy, an SQL + toolkit and Object Relational Mapper for Python, when the order_by or + group_by parameters can be controlled by an attacker. + Warning: The text coercion feature of SQLAlchemy is rarely used but the + warning that has been previously emitted is now an ArgumentError or in case + of the order_by() and group_by() parameters a CompileError. + 1.0.15+ds1-1 [Tue, 20 Sep 2016 21:44:37 +0200] Piotr Ożarowski <piotr@debian.org>: * New upstream version <http://piuparts.knut.univention.de/4.4-8/#5834702157873464034>
OK: yaml OK: announce_errata OK: patch OK: piuparts
<https://errata.software-univention.de/#/?erratum=4.4x1090>