summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMariusz Felisiak <felisiak.mariusz@gmail.com>2023-05-03 15:20:31 +0200
committerMariusz Felisiak <felisiak.mariusz@gmail.com>2023-05-03 15:20:31 +0200
commit49830025c992fbc8d8f213e7c16dba1391c6adf2 (patch)
tree3c1fc5216be65abe168fb118324c580e2e8a8038
parentb0d3a5de95c9966075c38f10e790dced70c81ebf (diff)
downloaddjango-49830025c992fbc8d8f213e7c16dba1391c6adf2.tar.gz
Added CVE-2023-31047 to security archive.
-rw-r--r--docs/releases/security.txt11
1 files changed, 11 insertions, 0 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt
index 0a82738709..c90d732397 100644
--- a/docs/releases/security.txt
+++ b/docs/releases/security.txt
@@ -36,6 +36,17 @@ Issues under Django's security process
All security issues have been handled under versions of Django's security
process. These are listed below.
+May 3, 2023 - :cve:`2023-31047`
+-------------------------------
+
+Potential bypass of validation when uploading multiple files using one form
+field. `Full description
+<https://www.djangoproject.com/weblog/2023/may/03/security-releases/>`__
+
+* Django 4.2 :commit:`(patch) <21b1b1fc03e5f9e9f8c977ee6e35618dd3b353dd>`
+* Django 4.1 :commit:`(patch) <e7c3a2ccc3a562328600be05068ed9149e12ce64>`
+* Django 3.2 :commit:`(patch) <eed53d0011622e70b936e203005f0e6f4ac48965>`
+
February 14, 2023 - :cve:`2023-24580`
-------------------------------------