diff options
| author | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2022-02-01 08:17:25 +0100 |
|---|---|---|
| committer | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2022-02-01 08:53:32 +0100 |
| commit | 6f309165e50378c41bc2d6190353d4dbcabcb8d1 (patch) | |
| tree | 5926f1b021f350770fda65833fac60488e08cab5 | |
| parent | 1e6b555c92fd39c9e11b5a27600a87ac964eb2bb (diff) | |
[3.2.x] Added CVE-2022-22818 and CVE-2022-23833 to security archive.
Backport of 9e0df0d6dde441dbbad2b548d777e0a01d633286 from main
| -rw-r--r-- | docs/releases/security.txt | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt index 37cc2b36e0..45ee878c36 100644 --- a/docs/releases/security.txt +++ b/docs/releases/security.txt @@ -36,6 +36,32 @@ Issues under Django's security process All security issues have been handled under versions of Django's security process. These are listed below. +February 1, 2022 - :cve:`2022-22818` +------------------------------------ + +Possible XSS via ``{% debug %}`` template tag. `Full description +<https://www.djangoproject.com/weblog/2022/feb/01/security-releases/>`__ + +Versions affected +~~~~~~~~~~~~~~~~~ + +* Django 4.0 :commit:`(patch) <01422046065d2b51f8f613409cad2c81b39487e5>` +* Django 3.2 :commit:`(patch) <1a1e8278c46418bde24c86a65443b0674bae65e2>` +* Django 2.2 :commit:`(patch) <c27a7eb9f40b64990398978152e62b6ff839c2e6>` + +February 1, 2022 - :cve:`2022-23833` +------------------------------------ + +Denial-of-service possibility in file uploads. `Full description +<https://www.djangoproject.com/weblog/2022/feb/01/security-releases/>`__ + +Versions affected +~~~~~~~~~~~~~~~~~ + +* Django 4.0 :commit:`(patch) <f9c7d48fdd6f198a6494a9202f90242f176e4fc9>` +* Django 3.2 :commit:`(patch) <d16133568ef9c9b42cb7a08bdf9ff3feec2e5468>` +* Django 2.2 :commit:`(patch) <c477b761804984c932704554ad35f78a2e230c6a>` + January 4, 2022 - :cve:`2021-45452` ------------------------------------ |
