<feed xmlns='http://www.w3.org/2005/Atom'>
<title>django.git/docs/releases/4.2.22.txt, branch main</title>
<subtitle>django
</subtitle>
<id>http://cgit.adnoto.dev/django.git/atom?h=main</id>
<link rel='self' href='http://cgit.adnoto.dev/django.git/atom?h=main'/>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/'/>
<updated>2025-06-04T11:33:30Z</updated>
<entry>
<title>Fixed CVE-2025-48432 -- Escaped formatting arguments in `log_response()`.</title>
<updated>2025-06-04T11:33:30Z</updated>
<author>
<name>Natalia</name>
<email>124304+nessita@users.noreply.github.com</email>
</author>
<published>2025-05-20T18:29:52Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=a07ebec5591e233d8bbb38b7d63f35c5479eef0e'/>
<id>urn:sha1:a07ebec5591e233d8bbb38b7d63f35c5479eef0e</id>
<content type='text'>
Suitably crafted requests containing a CRLF sequence in the request
path may have allowed log injection, potentially corrupting log files,
obscuring other attacks, misleading log post-processing tools, or
forging log entries.

To mitigate this, all positional formatting arguments passed to the
logger are now escaped using "unicode_escape" encoding.

Thanks to Seokchan Yoon (https://ch4n3.kr/) for the report.

Co-authored-by: Carlton Gibson &lt;carlton@noumenal.es&gt;
Co-authored-by: Jake Howard &lt;git@theorangeone.net&gt;
</content>
</entry>
<entry>
<title>Added stub release notes and release date for 5.2.2, 5.1.10, and 4.2.22.</title>
<updated>2025-05-28T13:03:06Z</updated>
<author>
<name>Natalia</name>
<email>124304+nessita@users.noreply.github.com</email>
</author>
<published>2025-05-28T13:03:06Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=1a744343999c9646912cee76ba0a2fa6ef5e6240'/>
<id>urn:sha1:1a744343999c9646912cee76ba0a2fa6ef5e6240</id>
<content type='text'>
</content>
</entry>
</feed>
