UbuntuUpdates.org

Package "python-django"

Name: python-django

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • High-level Python web development framework (documentation)
  • High-level Python web development framework

Latest version: 2:2.2.16-1ubuntu0.5
Release: groovy (20.10)
Level: updates
Repository: main

Links



Other versions of "python-django" in Groovy

Repository Area Version
base main 2:2.2.16-1
security main 2:2.2.16-1ubuntu0.5

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2:2.2.16-1ubuntu0.5 2021-06-02 12:06:26 UTC

  python-django (2:2.2.16-1ubuntu0.5) groovy-security; urgency=medium

  * SECURITY UPDATE: header injection in URLValidator with Python 3.9.5+
    - debian/patches/CVE-2021-32052.patch: prevent newlines and tabs from
      being accepted in URLValidator in django/core/validators.py,
      tests/validators/tests.py.
    - CVE-2021-32052
  * SECURITY UPDATE: potential directory traversal via admindocs
    - debian/patches/CVE-2021-33203.patch: use safe_join in
      django/contrib/admindocs/views.py, tests/admin_docs/test_views.py.
    - CVE-2021-33203
  * SECURITY UPDATE: possible indeterminate SSRF, RFI, and LFI attacks
    since validators accepted leading zeros in IPv4 addresses
    - debian/patches/CVE-2021-33571.patch: prevent leading zeros in IPv4
      addresses in django/core/validators.py,
      tests/validators/invalid_urls.txt, tests/validators/tests.py,
      tests/validators/valid_urls.txt.
    - CVE-2021-33571

 -- Marc Deslauriers <email address hidden> Wed, 26 May 2021 08:57:53 -0400

Source diff to previous version
CVE-2021-32052 In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless t
CVE-2021-33203 RESERVED
CVE-2021-33571 RESERVED

Version: 2:2.2.16-1ubuntu0.4 2021-05-04 13:06:25 UTC

  python-django (2:2.2.16-1ubuntu0.4) groovy-security; urgency=medium

  * SECURITY UPDATE: Potential directory-traversal via uploaded files
    - debian/patches/CVE-2021-31542.patch: tighten path & file name
      sanitation in file uploads in django/core/files/storage.py,
      django/core/files/uploadedfile.py, django/core/files/utils.py,
      django/db/models/fields/files.py, django/http/multipartparser.py,
      django/utils/text.py, tests/file_storage/test_generate_filename.py,
      tests/file_uploads/tests.py, tests/utils_tests/test_text.py,
      tests/forms_tests/field_tests/test_filefield.py.
    - CVE-2021-31542

 -- Marc Deslauriers <email address hidden> Wed, 28 Apr 2021 06:39:14 -0400

Source diff to previous version

Version: 2:2.2.16-1ubuntu0.3 2021-04-06 13:07:15 UTC

  python-django (2:2.2.16-1ubuntu0.3) groovy-security; urgency=medium

  * SECURITY UPDATE: Potential directory-traversal via uploaded files
    - debian/patches/CVE-2021-28658.patch: properly sanitize filenames in
      django/http/multipartparser.py, tests/file_uploads/tests.py,
      tests/file_uploads/uploadhandler.py, tests/file_uploads/urls.py,
      tests/file_uploads/views.py.
    - CVE-2021-28658

 -- Marc Deslauriers <email address hidden> Tue, 30 Mar 2021 14:51:14 -0400

Source diff to previous version

Version: 2:2.2.16-1ubuntu0.2 2021-02-22 17:06:24 UTC

  python-django (2:2.2.16-1ubuntu0.2) groovy-security; urgency=medium

  * SECURITY UPDATE: Web cache poisoning via limited_parse_qsl()
    - debian/patches/CVE-2021-23336.patch: no longer allow ; in parse_qsl()
      in django/utils/http.py, tests/handlers/test_exception.py,
      tests/requests/test_data_upload_settings.py,
      tests/utils_tests/test_http.py.
    - CVE-2021-23336

 -- Marc Deslauriers <email address hidden> Thu, 18 Feb 2021 10:37:09 -0500

Source diff to previous version
CVE-2021-23336 The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulne

Version: 2:2.2.16-1ubuntu0.1 2021-02-01 15:06:26 UTC

  python-django (2:2.2.16-1ubuntu0.1) groovy-security; urgency=medium

  * SECURITY UPDATE: Potential directory-traversal via archive.extract()
    - debian/patches/CVE-2021-3281.patch: check for invalid paths in
      django/utils/archive.py.
    - CVE-2021-3281

 -- Marc Deslauriers <email address hidden> Mon, 25 Jan 2021 07:29:17 -0500




About   -   Send Feedback to @ubuntu_updates