summaryrefslogtreecommitdiff
path: root/docs/releases/security.txt
diff options
context:
space:
mode:
authorMariusz Felisiak <felisiak.mariusz@gmail.com>2021-07-01 09:57:08 +0200
committerMariusz Felisiak <felisiak.mariusz@gmail.com>2021-07-01 09:57:08 +0200
commit8feb2a49fa37528823cc900bbd9609319738193e (patch)
tree55b99f5905c01c44878a1c00a6ae0211b576ef59 /docs/releases/security.txt
parentbcea1a3193d44d8c587173c00abb2eaf61fb9cf7 (diff)
Added CVE-2021-35042 to security archive.
Diffstat (limited to 'docs/releases/security.txt')
-rw-r--r--docs/releases/security.txt13
1 files changed, 13 insertions, 0 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt
index 8c8082c9ef..a59c6a145d 100644
--- a/docs/releases/security.txt
+++ b/docs/releases/security.txt
@@ -36,6 +36,19 @@ Issues under Django's security process
All security issues have been handled under versions of Django's security
process. These are listed below.
+July 1, 2021 - :cve:`2021-35042`
+--------------------------------
+
+Potential SQL injection via unsanitized ``QuerySet.order_by()`` input. `Full
+description
+<https://www.djangoproject.com/weblog/2021/jul/01/security-releases/>`__
+
+Versions affected
+~~~~~~~~~~~~~~~~~
+
+* Django 3.2 :commit:`(patch) <a34a5f724c5d5adb2109374ba3989ebb7b11f81f>`
+* Django 3.1 :commit:`(patch) <0bd57a879a0d54920bb9038a732645fb917040e9>`
+
June 2, 2021 - :cve:`2021-33203`
--------------------------------