summaryrefslogtreecommitdiff
path: root/docs/releases
diff options
context:
space:
mode:
authorMariusz Felisiak <felisiak.mariusz@gmail.com>2021-07-01 09:57:08 +0200
committerMariusz Felisiak <felisiak.mariusz@gmail.com>2021-07-01 10:01:23 +0200
commit9fadb97583a6246fbce8a70714e3ebd54b90f45c (patch)
tree28d1b523fef071ab920c6c5732bb6bf77709cdf8 /docs/releases
parent92efd69107ac6306064d0c69a1731f51196684c9 (diff)
[3.2.x] Added CVE-2021-35042 to security archive.
Backport of 8feb2a49fa37528823cc900bbd9609319738193e from main
Diffstat (limited to 'docs/releases')
-rw-r--r--docs/releases/security.txt13
1 files changed, 13 insertions, 0 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt
index 8c8082c9ef..a59c6a145d 100644
--- a/docs/releases/security.txt
+++ b/docs/releases/security.txt
@@ -36,6 +36,19 @@ Issues under Django's security process
All security issues have been handled under versions of Django's security
process. These are listed below.
+July 1, 2021 - :cve:`2021-35042`
+--------------------------------
+
+Potential SQL injection via unsanitized ``QuerySet.order_by()`` input. `Full
+description
+<https://www.djangoproject.com/weblog/2021/jul/01/security-releases/>`__
+
+Versions affected
+~~~~~~~~~~~~~~~~~
+
+* Django 3.2 :commit:`(patch) <a34a5f724c5d5adb2109374ba3989ebb7b11f81f>`
+* Django 3.1 :commit:`(patch) <0bd57a879a0d54920bb9038a732645fb917040e9>`
+
June 2, 2021 - :cve:`2021-33203`
--------------------------------