diff options
| author | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2022-04-11 10:32:22 +0200 |
|---|---|---|
| committer | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2022-04-11 10:36:52 +0200 |
| commit | e01b383e021d37e1b7ee62f1cf2e490fb849b95d (patch) | |
| tree | 16b4ba2931882b419de1fb7c362c21b83a473fe4 | |
| parent | ac2fb5ccb6bfcaab5aafcb0908d5b5208e72c918 (diff) | |
[3.2.x] Added CVE-2022-28346 and CVE-2022-28347 to security archive.
Backport of 78eeff8d33ead67cfc8603477c95e70f8fbe096a from main
| -rw-r--r-- | docs/releases/security.txt | 22 |
1 files changed, 22 insertions, 0 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt index 45ee878c36..b512cc7a7a 100644 --- a/docs/releases/security.txt +++ b/docs/releases/security.txt @@ -36,6 +36,28 @@ Issues under Django's security process All security issues have been handled under versions of Django's security process. These are listed below. +April 11, 2022 - :cve:`2022-28346` +---------------------------------- + +Potential SQL injection in ``QuerySet.annotate()``, ``aggregate()``, and +``extra()``. `Full description +<https://www.djangoproject.com/weblog/2022/apr/11/security-releases/>`__ + +* Django 4.0 :commit:`(patch) <800828887a0509ad1162d6d407e94d8de7eafc60>` +* Django 3.2 :commit:`(patch) <2044dac5c6968441be6f534c4139bcf48c5c7e48>` +* Django 2.2 :commit:`(patch) <2c09e68ec911919360d5f8502cefc312f9e03c5d>` + +April 11, 2022 - :cve:`2022-28347` +---------------------------------- + +Potential SQL injection via ``QuerySet.explain(**options)`` on PostgreSQL. +`Full description +<https://www.djangoproject.com/weblog/2022/apr/11/security-releases/>`__ + +* Django 4.0 :commit:`(patch) <00b0fc50e1738c7174c495464a5ef069408a4402>` +* Django 3.2 :commit:`(patch) <9e19accb6e0a00ba77d5a95a91675bf18877c72d>` +* Django 2.2 :commit:`(patch) <29a6c98b4c13af82064f993f0acc6e8fafa4d3f5>` + February 1, 2022 - :cve:`2022-22818` ------------------------------------ |
