summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorMariusz Felisiak <felisiak.mariusz@gmail.com>2022-06-22 12:44:04 +0200
committerMariusz Felisiak <felisiak.mariusz@gmail.com>2022-07-04 08:41:33 +0200
commita9010fe5555e6086a9d9ae50069579400ef0685e (patch)
tree9205cc581de9c817f3e1bbc9a19c2223816c69f7 /docs
parent3acf156be371b968b398062c28fe7a9449745a70 (diff)
[3.2.x] Fixed CVE-2022-34265 -- Protected Trunc(kind)/Extract(lookup_name) against SQL injection.
Thanks Takuto Yoshikai (Aeye Security Lab) for the report.
Diffstat (limited to 'docs')
-rw-r--r--docs/releases/3.2.14.txt11
1 files changed, 11 insertions, 0 deletions
diff --git a/docs/releases/3.2.14.txt b/docs/releases/3.2.14.txt
index bde1777376..f5719798c1 100644
--- a/docs/releases/3.2.14.txt
+++ b/docs/releases/3.2.14.txt
@@ -5,3 +5,14 @@ Django 3.2.14 release notes
*July 4, 2022*
Django 3.2.14 fixes a security issue with severity "high" in 3.2.13.
+
+CVE-2022-34265: Potential SQL injection via ``Trunc(kind)`` and ``Extract(lookup_name)`` arguments
+==================================================================================================
+
+:class:`Trunc() <django.db.models.functions.Trunc>` and
+:class:`Extract() <django.db.models.functions.Extract>` database functions were
+subject to SQL injection if untrusted data was used as a
+``kind``/``lookup_name`` value.
+
+Applications that constrain the lookup name and kind choice to a known safe
+list are unaffected.