summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCarlton Gibson <carlton.gibson@noumenal.es>2022-10-04 10:12:11 +0200
committerCarlton Gibson <carlton.gibson@noumenal.es>2022-10-04 10:13:25 +0200
commitaccdd0576d50b4696378ed1ab651c20affcae08b (patch)
tree82487d48040198ae23d7535e65cd65080ca19b7e
parent7190b38b8d2569e8d7a9f65e93d08ff44308fc81 (diff)
[3.2.x] Added CVE-2022-36359 to security archive.
Backport of 93d4c9ea1de24eb391cb2b3561b6703fd46374df from main
-rw-r--r--docs/releases/security.txt11
1 files changed, 11 insertions, 0 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt
index f039379e0e..940f91fa0f 100644
--- a/docs/releases/security.txt
+++ b/docs/releases/security.txt
@@ -36,6 +36,17 @@ Issues under Django's security process
All security issues have been handled under versions of Django's security
process. These are listed below.
+October 4, 2022 - :cve:`2022-41323`
+-----------------------------------
+
+Potential denial-of-service vulnerability in internationalized URLs. `Full
+description
+<https://www.djangoproject.com/weblog/2022/oct/04/security-releases/>`__
+
+* Django 4.1 :commit:`(patch) <9d656ea51d9ea7105c0c0785783ac29d426a7d25>`
+* Django 4.0 :commit:`(patch) <23f0093125ac2e553da6c1b2f9988eb6a3dd2ea1>`
+* Django 3.2 :commit:`(patch) <5b6b257fa7ec37ff27965358800c67e2dd11c924>`
+
August 3, 2022 - :cve:`2022-36359`
----------------------------------