Skip to content

Commit c5a107e

Browse files
committed
Added CVE-2025-64458 and CVE-2025-64459 to security archive.
1 parent 6e18c07 commit c5a107e

1 file changed

Lines changed: 24 additions & 0 deletions

File tree

docs/releases/security.txt

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,30 @@ Issues under Django's security process
3636
All security issues have been handled under versions of Django's security
3737
process. These are listed below.
3838

39+
November 5, 2025 - :cve:`2025-64458`
40+
------------------------------------
41+
42+
Potential denial-of-service vulnerability in ``HttpResponseRedirect`` and
43+
``HttpResponsePermanentRedirect`` on Windows. `Full description
44+
<https://www.djangoproject.com/weblog/2025/nov/05/security-releases/>`__
45+
46+
* Django 6.0 :commit:`(patch) <6e13348436fccf8f22982921d6a3a3e65c956a9f>`
47+
* Django 5.2 :commit:`(patch) <4f5d904b63751dea9ffc3b0e046404a7fa5881ac>`
48+
* Django 5.1 :commit:`(patch) <3790593781d26168e7306b5b2f8ea0309de16242>`
49+
* Django 4.2 :commit:`(patch) <770eea38d7a0e9ba9455140b5a9a9e33618226a7>`
50+
51+
November 5, 2025 - :cve:`2025-64459`
52+
------------------------------------
53+
54+
Potential SQL injection via ``_connector`` keyword argument in ``QuerySet`` and
55+
``Q`` objects. `Full description
56+
<https://www.djangoproject.com/weblog/2025/nov/05/security-releases/>`__
57+
58+
* Django 6.0 :commit:`(patch) <06dd38324ac3d60d83d9f3adabf0dcdf423d2a85>`
59+
* Django 5.2 :commit:`(patch) <6703f364d767e949c5b0e4016433ef75063b4f9b>`
60+
* Django 5.1 :commit:`(patch) <72d2c87431f2ae0431d65d0ec792047f078c8241>`
61+
* Django 4.2 :commit:`(patch) <59ae82e67053d281ff4562a24bbba21299f0a7d4>`
62+
3963
October 1, 2025 - :cve:`2025-59681`
4064
-----------------------------------
4165

0 commit comments

Comments
 (0)