summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMariusz Felisiak <felisiak.mariusz@gmail.com>2021-12-07 08:51:26 +0100
committerMariusz Felisiak <felisiak.mariusz@gmail.com>2021-12-07 08:55:21 +0100
commit7db9517a043496529a7b3b5c27d3cfd41c91d591 (patch)
tree16414d1765d0831790436e0e610e862c562e3eb3
parentefef2c1cf83b091cd6f45a6136aa9ab746670f71 (diff)
[3.1.x] Added CVE-2021-44420 to security archive.
Backport of 8747052411275d290b2152ffcb8dee11afbb82cd from main
-rw-r--r--docs/releases/security.txt14
1 files changed, 14 insertions, 0 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt
index 55f91b28e1..5d686bfd56 100644
--- a/docs/releases/security.txt
+++ b/docs/releases/security.txt
@@ -1243,3 +1243,17 @@ Versions affected
* Django 3.2 :commit:`(patch) <a34a5f724c5d5adb2109374ba3989ebb7b11f81f>`
* Django 3.1 :commit:`(patch) <0bd57a879a0d54920bb9038a732645fb917040e9>`
+
+December 7, 2021 - :cve:`2021-44420`
+------------------------------------
+
+Potential bypass of an upstream access control based on URL paths. `Full
+description
+<https://www.djangoproject.com/weblog/2021/dec/07/security-releases/>`__
+
+Versions affected
+~~~~~~~~~~~~~~~~~
+
+* Django 3.2 :commit:`(patch) <333c65603032c377e682cdbd7388657a5463a05a>`
+* Django 3.1 :commit:`(patch) <22bd17488159601bf0741b70ae7932bffea8eced>`
+* Django 2.2 :commit:`(patch) <7cf7d74e8a754446eeb85cacf2fef1247e0cb6d7>`