From 2a62cdcfec85938f40abb2e9e6a9ff497e02afe8 Mon Sep 17 00:00:00 2001 From: Mariusz Felisiak Date: Mon, 11 Apr 2022 10:32:22 +0200 Subject: [PATCH] [2.2.x] Added CVE-2022-28346 and CVE-2022-28347 to security archive. Backport of 78eeff8d33ead67cfc8603477c95e70f8fbe096a from main --- docs/releases/security.txt | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) diff --git a/docs/releases/security.txt b/docs/releases/security.txt index 8b85b4a981b..97718670af3 100644 --- a/docs/releases/security.txt +++ b/docs/releases/security.txt @@ -1311,3 +1311,25 @@ Versions affected * Django 4.0 :commit:`(patch) ` * Django 3.2 :commit:`(patch) ` * Django 2.2 :commit:`(patch) ` + +April 11, 2022 - :cve:`2022-28346` +---------------------------------- + +Potential SQL injection in ``QuerySet.annotate()``, ``aggregate()``, and +``extra()``. `Full description +`__ + +* Django 4.0 :commit:`(patch) <800828887a0509ad1162d6d407e94d8de7eafc60>` +* Django 3.2 :commit:`(patch) <2044dac5c6968441be6f534c4139bcf48c5c7e48>` +* Django 2.2 :commit:`(patch) <2c09e68ec911919360d5f8502cefc312f9e03c5d>` + +April 11, 2022 - :cve:`2022-28347` +---------------------------------- + +Potential SQL injection via ``QuerySet.explain(**options)`` on PostgreSQL. +`Full description +`__ + +* Django 4.0 :commit:`(patch) <00b0fc50e1738c7174c495464a5ef069408a4402>` +* Django 3.2 :commit:`(patch) <9e19accb6e0a00ba77d5a95a91675bf18877c72d>` +* Django 2.2 :commit:`(patch) <29a6c98b4c13af82064f993f0acc6e8fafa4d3f5>`