Added CVE-2020-7471 to security archive.

This commit is contained in:
Carlton Gibson 2020-02-03 10:11:34 +01:00
parent 1a2600d8df
commit d8b2ccbbb8
1 changed files with 13 additions and 0 deletions

View File

@ -1055,3 +1055,16 @@ Versions affected
* Django 3.0 :commit:`(patch) <302a4ff1e8b1c798aab97673909c7a3dfda42c26>` * Django 3.0 :commit:`(patch) <302a4ff1e8b1c798aab97673909c7a3dfda42c26>`
* Django 2.2 :commit:`(patch) <4d334bea06cac63dc1272abcec545b85136cca0e>` * Django 2.2 :commit:`(patch) <4d334bea06cac63dc1272abcec545b85136cca0e>`
* Django 1.11 :commit:`(patch) <f4cff43bf921fcea6a29b726eb66767f67753fa2>` * Django 1.11 :commit:`(patch) <f4cff43bf921fcea6a29b726eb66767f67753fa2>`
February 3, 2020 - :cve:`2020-7471`
-----------------------------------
Potential SQL injection via ``StringAgg(delimiter)``. `Full description
<https://www.djangoproject.com/weblog/2020/feb/03/security-releases/>`__
Versions affected
~~~~~~~~~~~~~~~~~
* Django 3.0 :commit:`(patch) <505826b469b16ab36693360da9e11fd13213421b>`
* Django 2.2 :commit:`(patch) <c67a368c16e4680b324b4f385398d638db4d8147>`
* Django 1.11 :commit:`(patch) <001b0634cd309e372edb6d7d95d083d02b8e37bd>`