[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1718-1] sqlalchemy security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : sqlalchemy
Version        : 0.9.8+dfsg-0.1+deb8u1
CVE ID         : CVE-2019-7164 CVE-2019-7548
Debian Bug     : 922669


Two vulnerabilities were discovered in SQLALchemy, a Python SQL
Toolkit and Object Relational Mapper.

CVE-2019-7164

    SQLAlchemy allows SQL Injection via the order_by parameter.

CVE-2019-7548

    SQLAlchemy has SQL Injection when the group_by parameter can be controlled.

The SQLAlchemy project warns that these security fixes break the
seldom-used text coercion feature.

For Debian 8 "Jessie", these problems have been fixed in version
0.9.8+dfsg-0.1+deb8u1.

We recommend that you upgrade your sqlalchemy packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEQic8GuN/xDR88HkSj/HLbo2JBZ8FAlyPnDwACgkQj/HLbo2J
BZ/qqgf9HVfWEeJd9mN/NcJ2/6VILPt7lyDNKuAircBJt4Ya9wTxGpvN3Vknt2ry
Z0oCMBz/z8EHNnlDyJHP4QGKrKXK2obwwVFfaOeel1b4OK6Aj3UMBzbEGypCn7y/
4GzWeQhJcejbhIc8xgJc8/NSqdjeJ7buxV2fny/L+3RNy3UDmLkTqKOaPn0vOau1
N5cOaazYhUvfBmdQCF5cebI5CCOWmpreOGm8QDbwHJAxO6VFtZyMdByQOOYCv80r
kQRuon9ia1qwqyVK8WjkDcV9pZxEI5dH7UN6+Eaum+ZAF+sJ/A3oNcc3iWB9N6JV
KXcPBxTWcIIQJTK+zWOvU1TJ0VTSww==
=JGde
-----END PGP SIGNATURE-----


Reply to: