Search for packages
| purl | pkg:ebuild/dev-python/django@5.2.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-3sac-ah8j-pucd | Django SQL injection in HasKey(lhs, rhs) on Oracle An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. Direct usage of the django.db.models.fields.json.HasKey lookup, when an Oracle database is used, is subject to SQL injection if untrusted data is used as an lhs value. (Applications that use the jsonfield.has_key lookup via __ are unaffected.) |
BIT-django-2024-53908
CVE-2024-53908 GHSA-m9g8-fxxm-xg86 PYSEC-2024-157 |
| VCID-4ztz-fq98-5fh1 | In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters. |
BIT-django-2023-41164
CVE-2023-41164 GHSA-7h4p-27mh-hmrw PYSEC-2023-225 |
| VCID-66w1-4zku-gyfp | Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it. |
BIT-django-2021-45452
CVE-2021-45452 GHSA-jrh2-hc4r-7jwx PYSEC-2022-3 |
| VCID-6gss-ppm5-3yc9 | An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input. |
BIT-django-2022-36359
CVE-2022-36359 GHSA-8x94-hmjh-97hq PYSEC-2022-245 |
| VCID-7tca-pgcs-cuhd | In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression. |
BIT-django-2022-41323
CVE-2022-41323 GHSA-qrw5-5h28-6cmg PYSEC-2022-304 |
| VCID-7tph-k8q2-bue2 | An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. |
BIT-django-2024-41991
CVE-2024-41991 GHSA-r836-hh6v-rg5g PYSEC-2024-69 |
| VCID-8xgs-8xjr-cber | An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings. |
BIT-django-2024-24680
CVE-2024-24680 GHSA-xxj9-f6rv-m3x4 PYSEC-2024-28 |
| VCID-9abh-apwm-ebab | An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags(). |
BIT-django-2025-32873
CVE-2025-32873 GHSA-8j24-cjrq-gr2m PYSEC-2025-37 |
| VCID-9k9t-vp1a-z7bt | In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. |
BIT-django-2021-3281
CVE-2021-3281 GHSA-fvgf-6h6h-3322 PYSEC-2021-9 |
| VCID-c8s7-3g9m-d3cw | In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) . |
BIT-django-2021-33571
CVE-2021-33571 GHSA-p99v-5w3c-jqq9 PYSEC-2021-99 |
| VCID-e2jd-yd4j-kqgt | Django allows enumeration of user e-mail addresses An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing). |
CVE-2024-45231
GHSA-rrqc-c2jx-6jgv |
| VCID-e87q-1j8h-93hh | An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.) |
BIT-django-2024-56374
CVE-2024-56374 GHSA-qcgg-j2x8-h9g8 PYSEC-2025-1 |
| VCID-gan1-9gwu-63d2 | Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application. |
BIT-django-2021-35042
CVE-2021-35042 GHSA-xpfp-f569-q3p2 PYSEC-2021-109 |
| VCID-gp5e-nguh-5fdk | An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files. |
BIT-django-2022-23833
CVE-2022-23833 GHSA-6cw3-g6wv-c2xv PYSEC-2022-20 |
| VCID-hwa2-n7a2-pyg1 | An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key. |
BIT-django-2021-45116
CVE-2021-45116 GHSA-8c5j-9r9f-c6w8 PYSEC-2022-2 |
| VCID-jh1e-72hp-fuf4 | In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665. |
BIT-django-2024-27351
CVE-2024-27351 GHSA-vm8q-m57g-pff3 PYSEC-2024-47 |
| VCID-jzae-1awh-k7cm | An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urlizetrunc were subject to a potential denial of service attack via certain inputs with a very large number of brackets. |
BIT-django-2024-38875
CVE-2024-38875 GHSA-qg2p-9jwr-mmqf PYSEC-2024-56 |
| VCID-kypj-ptb9-8qhz | In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names. |
BIT-django-2021-31542
CVE-2021-31542 GHSA-rxjp-mfm9-w4wr PYSEC-2021-7 |
| VCID-m91a-6235-nye9 | An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg. |
BIT-django-2024-42005
CVE-2024-42005 GHSA-pv4p-cwwg-4rph PYSEC-2024-70 |
| VCID-mga4-an1w-qqf9 | Django vulnerable to denial-of-service attack via the urlize() and urlizetrunc() template filters An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters. |
BIT-django-2024-45230
CVE-2024-45230 GHSA-5hgc-2vfp-mqvc PYSEC-2024-102 |
| VCID-mzdk-m12w-q3fc | In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. |
BIT-django-2021-44420
CVE-2021-44420 GHSA-v6rh-hp5x-86rv PYSEC-2021-439 |
| VCID-nese-5485-hkbs | In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large. |
BIT-django-2023-23969
CVE-2023-23969 GHSA-q2jf-h9jm-m7p4 PYSEC-2023-12 |
| VCID-pa75-6avj-duf7 | An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs. |
BIT-django-2022-28346
CVE-2022-28346 GHSA-2gwj-7jmv-h26r PYSEC-2022-190 |
| VCID-q12d-kv8p-8ff7 | An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password. |
BIT-django-2024-39329
CVE-2024-39329 GHSA-x7q2-wr7g-xqmf PYSEC-2024-57 |
| VCID-qm34-ec8s-tfd7 | Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories. |
BIT-django-2021-33203
CVE-2021-33203 GHSA-68w8-qjq3-2gfm PYSEC-2021-98 |
| VCID-t6uc-dfrd-jyfg | An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected. |
BIT-django-2022-34265
CVE-2022-34265 GHSA-p64x-8rxx-wf6q PYSEC-2022-213 |
| VCID-th9v-dk98-3kea | A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name. |
BIT-django-2022-28347
CVE-2022-28347 GHSA-w24h-v9qh-8gxj PYSEC-2022-191 |
| VCID-u3zk-tff2-aua9 | An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_language_variant() was subject to a potential denial-of-service attack when used with very long strings containing specific characters. |
BIT-django-2024-39614
CVE-2024-39614 GHSA-f6f8-9mx6-9mx2 PYSEC-2024-59 |
| VCID-u7m5-tzv2-c7hn | In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability. |
BIT-django-2021-28658
CVE-2021-28658 GHSA-xgxc-v2qg-chmh PYSEC-2021-6 |
| VCID-ume2-wt6y-jye7 | The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS. |
BIT-django-2022-22818
CVE-2022-22818 GHSA-95rw-fx8r-36v6 PYSEC-2022-19 |
| VCID-v1xr-z4zu-yfb4 | An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent. |
BIT-django-2024-41989
CVE-2024-41989 GHSA-jh75-99hh-qvx9 PYSEC-2024-67 |
| VCID-v4ad-xxy8-wfc9 | In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers. |
BIT-django-2021-32052
CVE-2021-32052 GHSA-qm57-vhq3-3fwf PYSEC-2021-8 |
| VCID-wwa5-mhgu-9khz | Django denial-of-service in django.utils.html.strip_tags() An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. The strip_tags() method and striptags template filter are subject to a potential denial-of-service attack via certain inputs containing large sequences of nested incomplete HTML entities. |
CVE-2024-53907
GHSA-8498-2h75-472j |
| VCID-xgv1-s2ek-q3dp | An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2.20. The django.utils.text.wrap() method and wordwrap template filter are subject to a potential denial-of-service attack when used with very long strings. |
BIT-django-2025-26699
CVE-2025-26699 GHSA-p3fp-8748-vqfq PYSEC-2025-13 |
| VCID-xhpa-mffz-syfy | An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters. |
BIT-django-2024-41990
CVE-2024-41990 GHSA-795c-9xpc-xw6g PYSEC-2024-68 |
| VCID-ypub-ukuh-p3aw | An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack. |
BIT-django-2023-24580
CVE-2023-24580 GHSA-2hrw-hx67-34x6 PYSEC-2023-13 |
| VCID-z27q-zfpz-ckby | An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes of the django.core.files.storage.Storage base class, when they override generate_filename() without replicating the file-path validations from the parent class, potentially allow directory traversal via certain inputs during a save() call. (Built-in Storage sub-classes are unaffected.) |
BIT-django-2024-39330
CVE-2024-39330 GHSA-9jmf-237g-qf46 PYSEC-2024-58 |
| VCID-z8z1-cjee-kfeg | An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack. |
BIT-django-2021-45115
CVE-2021-45115 GHSA-53qw-q765-4fww PYSEC-2022-1 |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T13:14:16.239724+00:00 | Gentoo Importer | Fixing | VCID-9abh-apwm-ebab | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.224388+00:00 | Gentoo Importer | Fixing | VCID-xgv1-s2ek-q3dp | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.208513+00:00 | Gentoo Importer | Fixing | VCID-e87q-1j8h-93hh | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.193489+00:00 | Gentoo Importer | Fixing | VCID-3sac-ah8j-pucd | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.176711+00:00 | Gentoo Importer | Fixing | VCID-wwa5-mhgu-9khz | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.160791+00:00 | Gentoo Importer | Fixing | VCID-e2jd-yd4j-kqgt | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.145841+00:00 | Gentoo Importer | Fixing | VCID-mga4-an1w-qqf9 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.130602+00:00 | Gentoo Importer | Fixing | VCID-m91a-6235-nye9 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.115195+00:00 | Gentoo Importer | Fixing | VCID-7tph-k8q2-bue2 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.100060+00:00 | Gentoo Importer | Fixing | VCID-xhpa-mffz-syfy | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.084765+00:00 | Gentoo Importer | Fixing | VCID-v1xr-z4zu-yfb4 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.069732+00:00 | Gentoo Importer | Fixing | VCID-u3zk-tff2-aua9 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.054949+00:00 | Gentoo Importer | Fixing | VCID-z27q-zfpz-ckby | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.039804+00:00 | Gentoo Importer | Fixing | VCID-q12d-kv8p-8ff7 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.024710+00:00 | Gentoo Importer | Fixing | VCID-jzae-1awh-k7cm | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:16.009585+00:00 | Gentoo Importer | Fixing | VCID-jh1e-72hp-fuf4 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.994723+00:00 | Gentoo Importer | Fixing | VCID-8xgs-8xjr-cber | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.979705+00:00 | Gentoo Importer | Fixing | VCID-4ztz-fq98-5fh1 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.964463+00:00 | Gentoo Importer | Fixing | VCID-ypub-ukuh-p3aw | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.949211+00:00 | Gentoo Importer | Fixing | VCID-nese-5485-hkbs | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.931806+00:00 | Gentoo Importer | Fixing | VCID-7tca-pgcs-cuhd | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.915811+00:00 | Gentoo Importer | Fixing | VCID-6gss-ppm5-3yc9 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.898406+00:00 | Gentoo Importer | Fixing | VCID-t6uc-dfrd-jyfg | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.883215+00:00 | Gentoo Importer | Fixing | VCID-th9v-dk98-3kea | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.868056+00:00 | Gentoo Importer | Fixing | VCID-pa75-6avj-duf7 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.851291+00:00 | Gentoo Importer | Fixing | VCID-gp5e-nguh-5fdk | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.836236+00:00 | Gentoo Importer | Fixing | VCID-ume2-wt6y-jye7 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.821144+00:00 | Gentoo Importer | Fixing | VCID-66w1-4zku-gyfp | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.806129+00:00 | Gentoo Importer | Fixing | VCID-hwa2-n7a2-pyg1 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.790587+00:00 | Gentoo Importer | Fixing | VCID-z8z1-cjee-kfeg | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.775486+00:00 | Gentoo Importer | Fixing | VCID-mzdk-m12w-q3fc | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.759994+00:00 | Gentoo Importer | Fixing | VCID-gan1-9gwu-63d2 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.744830+00:00 | Gentoo Importer | Fixing | VCID-c8s7-3g9m-d3cw | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.729795+00:00 | Gentoo Importer | Fixing | VCID-qm34-ec8s-tfd7 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.714596+00:00 | Gentoo Importer | Fixing | VCID-v4ad-xxy8-wfc9 | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.699623+00:00 | Gentoo Importer | Fixing | VCID-kypj-ptb9-8qhz | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.682760+00:00 | Gentoo Importer | Fixing | VCID-u7m5-tzv2-c7hn | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |
| 2026-04-01T13:14:15.666679+00:00 | Gentoo Importer | Fixing | VCID-9k9t-vp1a-z7bt | https://security.gentoo.org/glsa/202509-03 | 38.0.0 |