summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-07-04 14:31:49 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2022-07-04 14:32:30 +0200
commit9f9a454da1ad5b2302667b6feed29ad82aee7a78 (patch)
tree9cec3891f48229080156e06b2969a70c40a2031f
parent14d2bbf344340bd59c9c5f8e1a5b9e09df79afe0 (diff)
Add CVE-2022-34265/python-django
-rw-r--r--data/CVE/list10
1 files changed, 8 insertions, 2 deletions
diff --git a/data/CVE/list b/data/CVE/list
index 78b1a3716f..19393f8aaa 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -1866,8 +1866,14 @@ CVE-2022-34267
RESERVED
CVE-2022-34266
RESERVED
-CVE-2022-34265
- RESERVED
+CVE-2022-34265 [Potential SQL injection via Trunc(kind) and Extract(lookup_name) arguments]
+ RESERVED
+ - python-django <unfixed>
+ NOTE: https://www.openwall.com/lists/oss-security/2022/07/04/2
+ NOTE: https://www.djangoproject.com/weblog/2022/jul/04/security-releases/
+ NOTE: https://github.com/django/django/commit/54eb8a374d5d98594b264e8ec22337819b37443c (main)
+ NOTE: https://github.com/django/django/commit/0dc9c016fadb71a067e5a42be30164e3f96c0492 (4.0.6)
+ NOTE: https://github.com/django/django/commit/a9010fe5555e6086a9d9ae50069579400ef0685e (3.2.14)
CVE-2022-34264
RESERVED
CVE-2022-34263

© 2014-2024 Faster IT GmbH | imprint | privacy policy