diff options
| author | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2023-11-01 08:16:14 +0100 |
|---|---|---|
| committer | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2023-11-01 08:18:14 +0100 |
| commit | 9fee86e44dd83dc968ec443adcde191b3eba1286 (patch) | |
| tree | f2f9bf716b7e122f2b50ece8030919350f1558ff | |
| parent | db8575c8b2c078139df249326cda5a1b00fedb90 (diff) | |
[4.1.x] Added CVE-2023-46695 to security archive.stable/4.1.x
Backport of 7caf2621833a45cdfe7e6e305e4885ecc8d79744 from main
| -rw-r--r-- | docs/releases/security.txt | 13 |
1 files changed, 12 insertions, 1 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt index 6fdee8bf57..cf63dafa0d 100644 --- a/docs/releases/security.txt +++ b/docs/releases/security.txt @@ -36,8 +36,19 @@ Issues under Django's security process All security issues have been handled under versions of Django's security process. These are listed below. +November 1, 2023 - :cve:`2023-46695` +------------------------------------ + +Potential denial of service vulnerability in ``UsernameField`` on Windows. +`Full description +<https://www.djangoproject.com/weblog/2023/nov/01/security-releases/>`__ + +* Django 4.2 :commit:`(patch) <048a9ebb6ea468426cb4e57c71572cbbd975517f>` +* Django 4.1 :commit:`(patch) <4965bfdde2e5a5c883685019e57d123a3368a75e>` +* Django 3.2 :commit:`(patch) <f9a7fb8466a7ba4857eaf930099b5258f3eafb2b>` + October 4, 2023 - :cve:`2023-43665` -------------------------------------- +----------------------------------- Denial-of-service possibility in ``django.utils.text.Truncator``. `Full description |
