Package "python-django"
Name: |
python-django
|
Description: |
High-level Python web development framework (Python 2 version)
|
Latest version: |
1:1.11.11-1ubuntu1.18 |
Release: |
bionic (18.04) |
Level: |
security |
Repository: |
main |
Homepage: |
http://www.djangoproject.com/ |
Links
Download "python-django"
Other versions of "python-django" in Bionic
Packages in group
Deleted packages are displayed in grey.
Changelog
python-django (1:1.11.11-1ubuntu1.18) bionic-security; urgency=medium
* SECURITY UPDATE: Potential SQL invjection
- debian/patches/CVE-2022-34265.patch: protected
trunc/extract against SQL injection in
django/db/backends/base/operations.py,
django/db/models/functions/datetime.py.
- CVE-2022-34265
-- Leonidas Da Silva Barbosa <email address hidden> Wed, 29 Jun 2022 15:19:32 -0300
|
Source diff to previous version |
CVE-2022-34265 |
Potential SQL injection via Trunc(kind) and Extract(lookup_name) arguments |
|
python-django (1:1.11.11-1ubuntu1.17) bionic-security; urgency=medium
* SECURITY UPDATE: Potential SQL injection in QuerySet.annotate(),
aggregate(), and extra()
- debian/patches/CVE-2022-28346.patch: prevent SQL injection in column
aliases in django/db/models/sql/query.py, tests/aggregation/tests.py,
tests/annotations/tests.py, tests/queries/tests.py,
tests/expressions/test_queryset_values.py.
- CVE-2022-28346
* SECURITY UPDATE: header injection in URLValidator with Python security
update
- debian/patches/CVE-2021-32052.patch: prevent newlines and tabs from
being accepted in URLValidator in django/core/validators.py,
tests/validators/tests.py.
- CVE-2021-32052
-- Marc Deslauriers <email address hidden> Tue, 05 Apr 2022 12:40:49 -0400
|
Source diff to previous version |
CVE-2022-28346 |
Potential SQL injection in QuerySet.annotate(), aggregate(), and extra() |
CVE-2021-32052 |
In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless t |
|
python-django (1:1.11.11-1ubuntu1.16) bionic-security; urgency=medium
* SECURITY UPDATE: possible XSS via debug template tag
- debian/patches/CVE-2022-22818.patch: properly encode the current
context in django/template/defaulttags.py,
tests/template_tests/syntax_tests/test_debug.py,
tests/template_tests/tests.py.
- CVE-2022-22818
* SECURITY UPDATE: denial-of-service possibility in file uploads
- debian/patches/CVE-2022-23833.patch: fix infinite loop in
django/http/multipartparser.py, tests/file_uploads/tests.py.
- CVE-2022-23833
-- Marc Deslauriers <email address hidden> Tue, 01 Feb 2022 10:08:56 -0500
|
Source diff to previous version |
CVE-2022-22818 |
The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3 ... |
CVE-2022-23833 |
An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27 ... |
|
python-django (1:1.11.11-1ubuntu1.15) bionic-security; urgency=medium
* SECURITY UPDATE: Denial-of-service possibility in
UserAtributeSimilarityValidator
- debian/patches/CVE-2021-45115.patch: prevent DoS in
django/contrib/auth/password_validation.py,
docs/topics/auth/passwords.txt, tests/auth_tests/test_validators.py.
- CVE-2021-45115
* SECURITY UPDATE: Potential information disclosure in dictsort template
filter
- debian/patches/CVE-2021-45116.patch: properly handle private
variables in django/template/defaultfilters.py,
docs/ref/templates/builtins.txt,
tests/template_tests/filter_tests/test_dictsort.py,
tests/template_tests/filter_tests/test_dictsortreversed.py.
- CVE-2021-45116
* SECURITY UPDATE: Potential directory-traversal via Storage.save()
- debian/patches/CVE-2021-31542-2.patch: fix regression caused by fix
for CVE-2021-31542, and add allow_relative_path parameter to
validate_file_name(), required by the following patch.
- debian/patches/CVE-2021-45452.patch: fix path traversal in
django/core/files/storage.py,
tests/file_storage/test_generate_filename.py,
tests/file_storage/tests.py.
- CVE-2021-45452
-- Marc Deslauriers <email address hidden> Tue, 04 Jan 2022 08:38:45 -0500
|
Source diff to previous version |
CVE-2021-45115 |
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11 ... |
CVE-2021-45116 |
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11 ... |
CVE-2021-31542 |
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via upl |
CVE-2021-45452 |
Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 b ... |
|
python-django (1:1.11.11-1ubuntu1.14) bionic-security; urgency=medium
* SECURITY UPDATE: potential directory traversal via admindocs
- debian/patches/CVE-2021-33203.patch: use safe_join in
django/contrib/admindocs/views.py, tests/admin_docs/test_views.py.
- CVE-2021-33203
* SECURITY UPDATE: possible indeterminate SSRF, RFI, and LFI attacks
since validators accepted leading zeros in IPv4 addresses
- debian/patches/CVE-2021-33571.patch: prevent leading zeros in IPv4
addresses in django/core/validators.py,
tests/validators/invalid_urls.txt, tests/validators/tests.py,
tests/validators/valid_urls.txt.
- CVE-2021-33571
* debian/patches/disable_image_test.patch: disable failing test since
pillow security update.
-- Marc Deslauriers <email address hidden> Wed, 26 May 2021 09:22:24 -0400
|
|
About
-
Send Feedback to @ubuntu_updates