openSUSE-SU-2026:20184-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2026:20184-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/openSUSE-SU-2026:20184-1
Upstream
Related
Published
2026-02-07T13:45:17Z
Modified
2026-03-12T02:08:09.659111Z
Summary
Security update for python-Django
Details

This update for python-Django fixes the following issues:

Changes in python-Django:

  • CVE-2026-1312: Fixed potential SQL injection via QuerySet.order_by and FilteredRelation (bsc#1257408).
  • CVE-2026-1287: Fixed potential SQL injection in column aliases via control characters (bsc#1257407).
  • CVE-2026-1207: Fixed potential SQL injection via raster lookups on PostGIS (bsc#1257405).
  • CVE-2026-1285: Fixed potential denial-of-service in django.utils.text.Truncator HTML methods (bsc#1257406).
  • CVE-2025-13473: Fixed username enumeration through timing difference in mod_wsgi authentication handler (bsc#1257401).
  • CVE-2025-14550: Fixed potential denial-of-service via repeated headers when using ASGI (bsc#1257403).
References

Affected packages

openSUSE:Leap 16.0 / python-Django

Package

Name
python-Django
Purl
pkg:rpm/opensuse/python-Django&distro=openSUSE%20Leap%2016.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.2.4-bp160.5.1

Ecosystem specific

{
    "binaries": [
        {
            "python313-Django": "5.2.4-bp160.5.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2026:20184-1.json"