1
0
mirror of https://github.com/django/django.git synced 2025-10-09 14:59:24 +00:00

[5.2.x] Added CVE-2025-59681 and CVE-2025-59682 to security archive.

Backport of 43d84aef04a9e71164c21a74885996981857e66e from main.
This commit is contained in:
Jacob Walls 2025-10-01 10:39:02 -04:00
parent f94449ef69
commit 071afc3d01

View File

@ -36,6 +36,30 @@ Issues under Django's security process
All security issues have been handled under versions of Django's security All security issues have been handled under versions of Django's security
process. These are listed below. process. These are listed below.
October 1, 2025 - :cve:`2025-59681`
-----------------------------------
Potential SQL injection in ``QuerySet.annotate()``, ``alias()``, ``aggregate()``, and ``extra()`` on MySQL and MariaDB.
`Full description
<https://www.djangoproject.com/weblog/2025/oct/01/security-releases/>`__
* Django 6.0 :commit:`(patch) <4ceaaee7e04b416fc465e838a6ef43ca0ccffafe>`
* Django 5.2 :commit:`(patch) <52fbae0a4dbbe5faa59827f8f05694a0065cc135>`
* Django 5.1 :commit:`(patch) <01d2d770e22bffe53c7f1e611e2bbca94cb8a2e7>`
* Django 4.2 :commit:`(patch) <38d9ef8c7b5cb6ef51b933e51a20e0e0063f33d5>`
October 1, 2025 - :cve:`2025-59682`
-----------------------------------
Potential partial directory-traversal via ``archive.extract()``.
`Full description
<https://www.djangoproject.com/weblog/2025/oct/01/security-releases/>`__
* Django 6.0 :commit:`(patch) <af067f56c1dd467df4abd0ddd409a700da1f03ba>`
* Django 5.2 :commit:`(patch) <ed8fc39d77465eddbde1191a054ae965f6a8a584>`
* Django 5.1 :commit:`(patch) <74fa85c688a87224637155902bcd738bb9e65e11>`
* Django 4.2 :commit:`(patch) <9504bbaa392c9fe37eee9291f5b4c29eb6037619>`
September 3, 2025 - :cve:`2025-57833` September 3, 2025 - :cve:`2025-57833`
------------------------------------- -------------------------------------