diff options
| author | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2021-07-01 09:57:08 +0200 |
|---|---|---|
| committer | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2021-07-01 09:57:08 +0200 |
| commit | 8feb2a49fa37528823cc900bbd9609319738193e (patch) | |
| tree | 55b99f5905c01c44878a1c00a6ae0211b576ef59 /docs/releases/security.txt | |
| parent | bcea1a3193d44d8c587173c00abb2eaf61fb9cf7 (diff) | |
Added CVE-2021-35042 to security archive.
Diffstat (limited to 'docs/releases/security.txt')
| -rw-r--r-- | docs/releases/security.txt | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt index 8c8082c9ef..a59c6a145d 100644 --- a/docs/releases/security.txt +++ b/docs/releases/security.txt @@ -36,6 +36,19 @@ Issues under Django's security process All security issues have been handled under versions of Django's security process. These are listed below. +July 1, 2021 - :cve:`2021-35042` +-------------------------------- + +Potential SQL injection via unsanitized ``QuerySet.order_by()`` input. `Full +description +<https://www.djangoproject.com/weblog/2021/jul/01/security-releases/>`__ + +Versions affected +~~~~~~~~~~~~~~~~~ + +* Django 3.2 :commit:`(patch) <a34a5f724c5d5adb2109374ba3989ebb7b11f81f>` +* Django 3.1 :commit:`(patch) <0bd57a879a0d54920bb9038a732645fb917040e9>` + June 2, 2021 - :cve:`2021-33203` -------------------------------- |
