From ab58f072502e86dfe21b2bd5cccdc5e94dce8d26 Mon Sep 17 00:00:00 2001 From: Carlton Gibson Date: Fri, 19 Feb 2021 11:02:32 +0100 Subject: Added CVE-2021-23336 to security archive. --- docs/releases/security.txt | 15 +++++++++++++++ 1 file changed, 15 insertions(+) (limited to 'docs/releases/security.txt') diff --git a/docs/releases/security.txt b/docs/releases/security.txt index bf9ab66e8a..504e3a2ece 100644 --- a/docs/releases/security.txt +++ b/docs/releases/security.txt @@ -36,6 +36,21 @@ Issues under Django's security process All security issues have been handled under versions of Django's security process. These are listed below. +February 19, 2021 - :cve:`2021-23336` +------------------------------------- + +Web cache poisoning via ``django.utils.http.limited_parse_qsl()``. `Full +description +`__ + +Versions affected +~~~~~~~~~~~~~~~~~ + +* Django 3.2 :commit:`(patch) ` +* Django 3.1 :commit:`(patch) <8f6d431b08cbb418d9144b976e7b972546607851>` +* Django 3.0 :commit:`(patch) <326a926beef869d3341bc9ef737887f0449b6b71>` +* Django 2.2 :commit:`(patch) ` + February 1, 2021 - :cve:`2021-3281` ----------------------------------- -- cgit v1.2.1