UbuntuUpdates.org

Package "python3-django"

Name: python3-django

Description:

High-level Python web development framework (Python 3 version)

Latest version: 1:1.11.11-1ubuntu1.21
Release: bionic (18.04)
Level: updates
Repository: main
Head package: python-django
Homepage: http://www.djangoproject.com/

Links


Download "python3-django"


Other versions of "python3-django" in Bionic

Repository Area Version
base main 1:1.11.11-1ubuntu1
security main 1:1.11.11-1ubuntu1.21

Changelog

Version: 1:1.11.11-1ubuntu1.16 2022-02-03 14:07:44 UTC

  python-django (1:1.11.11-1ubuntu1.16) bionic-security; urgency=medium

  * SECURITY UPDATE: possible XSS via debug template tag
    - debian/patches/CVE-2022-22818.patch: properly encode the current
      context in django/template/defaulttags.py,
      tests/template_tests/syntax_tests/test_debug.py,
      tests/template_tests/tests.py.
    - CVE-2022-22818
  * SECURITY UPDATE: denial-of-service possibility in file uploads
    - debian/patches/CVE-2022-23833.patch: fix infinite loop in
      django/http/multipartparser.py, tests/file_uploads/tests.py.
    - CVE-2022-23833

 -- Marc Deslauriers <email address hidden> Tue, 01 Feb 2022 10:08:56 -0500

Source diff to previous version
CVE-2022-22818 The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3 ...
CVE-2022-23833 An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27 ...

Version: 1:1.11.11-1ubuntu1.15 2022-01-05 15:06:29 UTC

  python-django (1:1.11.11-1ubuntu1.15) bionic-security; urgency=medium

  * SECURITY UPDATE: Denial-of-service possibility in
    UserAtributeSimilarityValidator
    - debian/patches/CVE-2021-45115.patch: prevent DoS in
      django/contrib/auth/password_validation.py,
      docs/topics/auth/passwords.txt, tests/auth_tests/test_validators.py.
    - CVE-2021-45115
  * SECURITY UPDATE: Potential information disclosure in dictsort template
    filter
    - debian/patches/CVE-2021-45116.patch: properly handle private
      variables in django/template/defaultfilters.py,
      docs/ref/templates/builtins.txt,
      tests/template_tests/filter_tests/test_dictsort.py,
      tests/template_tests/filter_tests/test_dictsortreversed.py.
    - CVE-2021-45116
  * SECURITY UPDATE: Potential directory-traversal via Storage.save()
    - debian/patches/CVE-2021-31542-2.patch: fix regression caused by fix
      for CVE-2021-31542, and add allow_relative_path parameter to
      validate_file_name(), required by the following patch.
    - debian/patches/CVE-2021-45452.patch: fix path traversal in
      django/core/files/storage.py,
      tests/file_storage/test_generate_filename.py,
      tests/file_storage/tests.py.
    - CVE-2021-45452

 -- Marc Deslauriers <email address hidden> Tue, 04 Jan 2022 08:38:45 -0500

Source diff to previous version
CVE-2021-45115 An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11 ...
CVE-2021-45116 An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11 ...
CVE-2021-31542 In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via upl
CVE-2021-45452 Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 b ...

Version: 1:1.11.11-1ubuntu1.14 2021-06-02 12:06:23 UTC

  python-django (1:1.11.11-1ubuntu1.14) bionic-security; urgency=medium

  * SECURITY UPDATE: potential directory traversal via admindocs
    - debian/patches/CVE-2021-33203.patch: use safe_join in
      django/contrib/admindocs/views.py, tests/admin_docs/test_views.py.
    - CVE-2021-33203
  * SECURITY UPDATE: possible indeterminate SSRF, RFI, and LFI attacks
    since validators accepted leading zeros in IPv4 addresses
    - debian/patches/CVE-2021-33571.patch: prevent leading zeros in IPv4
      addresses in django/core/validators.py,
      tests/validators/invalid_urls.txt, tests/validators/tests.py,
      tests/validators/valid_urls.txt.
    - CVE-2021-33571
  * debian/patches/disable_image_test.patch: disable failing test since
    pillow security update.

 -- Marc Deslauriers <email address hidden> Wed, 26 May 2021 09:22:24 -0400

Source diff to previous version
CVE-2021-33203 RESERVED
CVE-2021-33571 RESERVED

Version: 1:1.11.11-1ubuntu1.13 2021-05-04 13:06:20 UTC

  python-django (1:1.11.11-1ubuntu1.13) bionic-security; urgency=medium

  * SECURITY UPDATE: Potential directory-traversal via uploaded files
    - debian/patches/CVE-2021-31542.patch: tighten path & file name
      sanitation in file uploads in django/core/files/storage.py,
      django/core/files/uploadedfile.py, django/core/files/utils.py,
      django/db/models/fields/files.py, django/http/multipartparser.py,
      django/utils/text.py, tests/file_storage/test_generate_filename.py,
      tests/file_uploads/tests.py, tests/utils_tests/test_text.py,
      tests/forms_tests/field_tests/test_filefield.py.
    - CVE-2021-31542

 -- Marc Deslauriers <email address hidden> Wed, 28 Apr 2021 06:44:31 -0400

Source diff to previous version

Version: 1:1.11.11-1ubuntu1.12 2021-04-06 13:07:11 UTC

  python-django (1:1.11.11-1ubuntu1.12) bionic-security; urgency=medium

  * SECURITY UPDATE: Potential directory-traversal via uploaded files
    - debian/patches/CVE-2021-28658.patch: properly sanitize filenames in
      django/http/multipartparser.py, tests/file_uploads/tests.py,
      tests/file_uploads/uploadhandler.py, tests/file_uploads/urls.py,
      tests/file_uploads/views.py.
    - CVE-2021-28658

 -- Marc Deslauriers <email address hidden> Tue, 30 Mar 2021 14:55:49 -0400




About   -   Send Feedback to @ubuntu_updates