<feed xmlns='http://www.w3.org/2005/Atom'>
<title>django.git/tests/expressions/test_queryset_values.py, branch stable/4.2.x</title>
<subtitle>django
</subtitle>
<id>http://cgit.adnoto.dev/django.git/atom?h=stable%2F4.2.x</id>
<link rel='self' href='http://cgit.adnoto.dev/django.git/atom?h=stable%2F4.2.x'/>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/'/>
<updated>2026-02-03T13:25:58Z</updated>
<entry>
<title>[4.2.x] Fixed CVE-2026-1287 -- Protected against SQL injection in column aliases via control characters.</title>
<updated>2026-02-03T13:25:58Z</updated>
<author>
<name>Jake Howard</name>
<email>git@theorangeone.net</email>
</author>
<published>2026-01-21T11:14:48Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=f75f8f3597e1ce351d5ac08b6ba7ebd9dadd9b5d'/>
<id>urn:sha1:f75f8f3597e1ce351d5ac08b6ba7ebd9dadd9b5d</id>
<content type='text'>
Control characters in FilteredRelation column aliases could be used for
SQL injection attacks. This affected QuerySet.annotate(), aggregate(),
extra(), values(), values_list(), and alias() when using dictionary
expansion with **kwargs.

Thanks Solomon Kebede for the report, and Simon Charette, Jacob Walls,
and Natalia Bidart for reviews.

Backport of e891a84c7ef9962bfcc3b4685690219542f86a22 from main.
</content>
</entry>
<entry>
<title>[4.2.x] Fixed CVE-2025-59681 -- Protected QuerySet.annotate(), alias(), aggregate(), and extra() against SQL injection in column aliases on MySQL/MariaDB.</title>
<updated>2025-10-01T13:05:20Z</updated>
<author>
<name>Mariusz Felisiak</name>
<email>felisiak.mariusz@gmail.com</email>
</author>
<published>2025-09-10T07:53:52Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=38d9ef8c7b5cb6ef51b933e51a20e0e0063f33d5'/>
<id>urn:sha1:38d9ef8c7b5cb6ef51b933e51a20e0e0063f33d5</id>
<content type='text'>
Thanks sw0rd1ight for the report.

Follow up to 93cae5cb2f9a4ef1514cf1a41f714fef08005200.

Backport of 41b43c74bda19753c757036673ea9db74acf494a from main.
</content>
</entry>
<entry>
<title>[4.2.x] Fixed CVE-2024-42005 -- Mitigated QuerySet.values() SQL injection attacks against JSON fields.</title>
<updated>2024-07-31T14:12:35Z</updated>
<author>
<name>Simon Charette</name>
<email>charette.s@gmail.com</email>
</author>
<published>2024-07-25T16:19:13Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=f4af67b9b41e0f4c117a8741da3abbd1c869ab28'/>
<id>urn:sha1:f4af67b9b41e0f4c117a8741da3abbd1c869ab28</id>
<content type='text'>
Thanks Eyal (eyalgabay) for the report.
</content>
</entry>
<entry>
<title>Relaxed some query ordering assertions in various tests.</title>
<updated>2022-04-14T10:12:13Z</updated>
<author>
<name>Mariusz Felisiak</name>
<email>felisiak.mariusz@gmail.com</email>
</author>
<published>2022-04-14T10:12:13Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=1760ad4e8cdbf34a0f38deae300460a0b9c38eac'/>
<id>urn:sha1:1760ad4e8cdbf34a0f38deae300460a0b9c38eac</id>
<content type='text'>
It accounts for differences seen on MySQL with MyISAM storage engine.</content>
</entry>
<entry>
<title>Fixed CVE-2022-28346 -- Protected QuerySet.annotate(), aggregate(), and extra() against SQL injection in column aliases.</title>
<updated>2022-04-11T06:59:33Z</updated>
<author>
<name>Mariusz Felisiak</name>
<email>felisiak.mariusz@gmail.com</email>
</author>
<published>2022-04-01T06:10:22Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=93cae5cb2f9a4ef1514cf1a41f714fef08005200'/>
<id>urn:sha1:93cae5cb2f9a4ef1514cf1a41f714fef08005200</id>
<content type='text'>
Thanks Splunk team: Preston Elder, Jacob Davis, Jacob Moore,
Matt Hanson, David Briggs, and a security researcher: Danylo Dmytriiev
(DDV_UA) for the report.
</content>
</entry>
<entry>
<title>Refs #33476 -- Reformatted code with Black.</title>
<updated>2022-02-07T19:37:05Z</updated>
<author>
<name>django-bot</name>
<email>ops@djangoproject.com</email>
</author>
<published>2022-02-03T19:24:19Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=9c19aff7c7561e3a82978a272ecdaad40dda5c00'/>
<id>urn:sha1:9c19aff7c7561e3a82978a272ecdaad40dda5c00</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Simplified imports from django.db and django.contrib.gis.db.</title>
<updated>2020-02-04T12:20:06Z</updated>
<author>
<name>Nick Pope</name>
<email>nick.pope@flightdataservices.com</email>
</author>
<published>2019-08-20T07:54:41Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=335c9c94acf263901fb023404408880245b0c4b4'/>
<id>urn:sha1:335c9c94acf263901fb023404408880245b0c4b4</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Refs #23919 -- Removed encoding preambles and future imports</title>
<updated>2017-01-18T08:55:19Z</updated>
<author>
<name>Claude Paroz</name>
<email>claude@2xlibre.net</email>
</author>
<published>2016-11-19T17:19:41Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=d7b9aaa366dd54ecc3142c588162e3adc7c2f7ac'/>
<id>urn:sha1:d7b9aaa366dd54ecc3142c588162e3adc7c2f7ac</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fixed #25871 -- Added expressions support to QuerySet.values().</title>
<updated>2016-08-18T20:05:15Z</updated>
<author>
<name>Ian Foote</name>
<email>python@ian.feete.org</email>
</author>
<published>2016-08-15T01:35:12Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=39f35d4b9de223b72c67bb1d12e65669b4e1355b'/>
<id>urn:sha1:39f35d4b9de223b72c67bb1d12e65669b4e1355b</id>
<content type='text'>
</content>
</entry>
</feed>
