2022-06-01 14:36:22 +02:00
|
|
|
==========================
|
|
|
|
Django 4.0.6 release notes
|
|
|
|
==========================
|
|
|
|
|
2022-06-22 12:36:24 +02:00
|
|
|
*July 4, 2022*
|
2022-06-01 14:36:22 +02:00
|
|
|
|
2022-06-22 12:36:24 +02:00
|
|
|
Django 4.0.6 fixes a security issue with severity "high" in 4.0.5.
|
2022-06-01 14:36:22 +02:00
|
|
|
|
2022-06-22 12:44:04 +02:00
|
|
|
CVE-2022-34265: Potential SQL injection via ``Trunc(kind)`` and ``Extract(lookup_name)`` arguments
|
|
|
|
==================================================================================================
|
2022-06-01 14:36:22 +02:00
|
|
|
|
2022-06-22 12:44:04 +02:00
|
|
|
:class:`Trunc() <django.db.models.functions.Trunc>` and
|
|
|
|
:class:`Extract() <django.db.models.functions.Extract>` database functions were
|
|
|
|
subject to SQL injection if untrusted data was used as a
|
|
|
|
``kind``/``lookup_name`` value.
|
|
|
|
|
|
|
|
Applications that constrain the lookup name and kind choice to a known safe
|
|
|
|
list are unaffected.
|