[3.1.x] Added CVE-2021-23336 to security archive.

Backport of ab58f07250 from master
This commit is contained in:
Carlton Gibson 2021-02-19 11:05:36 +01:00
parent 87481ea20c
commit 3668da8de8
1 changed files with 15 additions and 0 deletions

View File

@ -1147,3 +1147,18 @@ Versions affected
* Django 3.1 :commit:`(patch) <02e6592835b4559909aa3aaaf67988fef435f624>` * Django 3.1 :commit:`(patch) <02e6592835b4559909aa3aaaf67988fef435f624>`
* Django 3.0 :commit:`(patch) <52e409ed17287e9aabda847b6afe58be2fa9f86a>` * Django 3.0 :commit:`(patch) <52e409ed17287e9aabda847b6afe58be2fa9f86a>`
* Django 2.2 :commit:`(patch) <21e7622dec1f8612c85c2fc37fe8efbfd3311e37>` * Django 2.2 :commit:`(patch) <21e7622dec1f8612c85c2fc37fe8efbfd3311e37>`
February 19, 2021 - :cve:`2021-23336`
-------------------------------------
Web cache poisoning via ``django.utils.http.limited_parse_qsl()``. `Full
description
<https://www.djangoproject.com/weblog/2021/feb/19/security-releases/>`__
Versions affected
~~~~~~~~~~~~~~~~~
* Django 3.2 :commit:`(patch) <be8237c7cce24b06aabde0b97afce98ddabbe3b6>`
* Django 3.1 :commit:`(patch) <8f6d431b08cbb418d9144b976e7b972546607851>`
* Django 3.0 :commit:`(patch) <326a926beef869d3341bc9ef737887f0449b6b71>`
* Django 2.2 :commit:`(patch) <fd6b6afd5959b638c62dbf4839ccff97e7f7dfda>`