Mariusz Felisiak
2a62cdcfec
[2.2.x] Added CVE-2022-28346 and CVE-2022-28347 to security archive.
...
Backport of 78eeff8d33
from main
2022-04-11 10:37:53 +02:00
Mariusz Felisiak
29a6c98b4c
[2.2.x] Fixed CVE-2022-28347 -- Protected QuerySet.explain(**options) against SQL injection on PostgreSQL.
...
Backport of 6723a26e59
from main.
2022-04-11 09:23:12 +02:00
Mariusz Felisiak
2c09e68ec9
[2.2.x] Fixed CVE-2022-28346 -- Protected QuerySet.annotate(), aggregate(), and extra() against SQL injection in column aliases.
...
Thanks Splunk team: Preston Elder, Jacob Davis, Jacob Moore,
Matt Hanson, David Briggs, and a security researcher: Danylo Dmytriiev
(DDV_UA) for the report.
Backport of 93cae5cb2f
from main.
2022-04-11 09:22:17 +02:00
Mariusz Felisiak
8352b98e46
[2.2.x] Added stub release notes for 2.2.28.
...
Backport of 78277faafd
from main
2022-04-04 10:55:50 +02:00
David Smith
9d13d8c10b
[2.2.x] Fixed typo in release notes.
...
Backport of 770d3e6a4c
from main.
2022-02-02 07:20:28 +01:00
Mariusz Felisiak
047ece3014
[2.2.x] Added CVE-2022-22818 and CVE-2022-23833 to security archive.
...
Backport of 9e0df0d6dd
from main
2022-02-01 08:54:34 +01:00
Mariusz Felisiak
c477b76180
[2.2.x] Fixed CVE-2022-23833 -- Fixed DoS possiblity in file uploads.
...
Thanks Alan Ryan for the report and initial patch.
Backport of fc18f36c4a
from main.
2022-02-01 07:57:28 +01:00
Markus Holtermann
c27a7eb9f4
[2.2.x] Fixed CVE-2022-22818 -- Fixed possible XSS via {% debug %} template tag.
...
Thanks Keryn Knight for the report.
Backport of 394517f078
from main.
Co-authored-by: Adam Johnson <me@adamj.eu>
2022-02-01 07:56:29 +01:00
Mariusz Felisiak
4cafd3aacb
[2.2.x] Added stub release notes 2.2.27.
...
Backport of eeca934238
from main.
2022-01-25 07:29:28 +01:00
Carlton Gibson
77d0fe5868
[2.2.x] Added CVE-2021-45115, CVE-2021-45116, and CVE-2021-45452 to security archive.
...
Backport of 63869ab1f1
from main
2022-01-04 11:39:54 +01:00
Florian Apolloner
4cb35b384c
[2.2.x] Fixed CVE-2021-45452 -- Fixed potential path traversal in storage subsystem.
...
Thanks to Dennis Brinkrolf for the report.
2022-01-04 10:20:31 +01:00
Florian Apolloner
c9f648ccfa
[2.2.x] Fixed CVE-2021-45116 -- Fixed potential information disclosure in dictsort template filter.
...
Thanks to Dennis Brinkrolf for the report.
Co-authored-by: Adam Johnson <me@adamj.eu>
2022-01-04 10:20:31 +01:00
Florian Apolloner
2135637fdd
[2.2.x] Fixed CVE-2021-45115 -- Prevented DoS vector in UserAttributeSimilarityValidator.
...
Thanks Chris Bailey for the report.
Co-authored-by: Adam Johnson <me@adamj.eu>
2022-01-04 10:20:31 +01:00
Carlton Gibson
03b733d8a8
[2.2.x] Added stub release notes for 2.2.26 release.
2021-12-28 10:10:15 +01:00
Mariusz Felisiak
573e70ea48
[2.2.x] Added CVE-2021-44420 to security archive.
...
Backport of 8747052411
from main
2021-12-07 08:56:25 +01:00
Florian Apolloner
7cf7d74e8a
[2.2.x] Fixed #30530 , CVE-2021-44420 -- Fixed potential bypass of an upstream access control based on URL paths.
...
Thanks Sjoerd Job Postmus and TengMA(@te3t123) for reports.
Backport of d4dcd5b9dd
from main.
2021-12-07 07:02:14 +01:00
Mariusz Felisiak
fac0fdd95d
[2.2.x] Added stub release notes for 2.2.25.
...
Backport of ae4077e13e
from main.
2021-11-30 11:31:56 +01:00
Mariusz Felisiak
dc43667eab
[2.2.x] Fixed docs header underlines in security archive.
...
Backport of d9cee3f5f2
from main
2021-06-02 12:29:11 +02:00
Carlton Gibson
3e7bb564be
[2.2.x] Added CVE-2021-33203 and CVE-2021-33571 to security archive.
...
Backport of a39f235ca4
from main
2021-06-02 11:19:59 +02:00
Mariusz Felisiak
f27c38ab5d
[2.2.x] Fixed CVE-2021-33571 -- Prevented leading zeros in IPv4 addresses.
...
validate_ipv4_address() was affected only on Python < 3.9.5, see [1].
URLValidator() uses a regular expressions and it was affected on all
Python versions.
[1] https://bugs.python.org/issue36384
2021-06-02 10:26:22 +02:00
Florian Apolloner
053cc9534d
[2.2.x] Fixed CVE-2021-33203 -- Fixed potential path-traversal via admindocs' TemplateDetailView.
2021-06-02 10:26:22 +02:00
Carlton Gibson
6229d8794f
[2.2.x] Confirmed release date for Django 2.2.24.
...
Backport of f66ae7a2d5
from main.
2021-06-02 10:23:20 +02:00
Carlton Gibson
f163ad5c63
[2.2.x] Added stub release notes and date for Django 2.2.24.
...
Backport of b46dbd4e3e
from main
2021-05-26 10:21:53 +02:00
Mariusz Felisiak
bed1755bc5
[2.2.x] Changed IRC references to Libera.Chat.
...
Backport of 66491f08fe
from main.
2021-05-20 12:42:48 +02:00
Mariusz Felisiak
b8ecb06436
[2.2.x] Fixed #32718 -- Relaxed file name validation in FileField.
...
- Validate filename returned by FileField.upload_to() not a filename
passed to the FileField.generate_filename() (upload_to() may
completely ignored passed filename).
- Allow relative paths (without dot segments) in the generated filename.
Thanks to Jakub Kleň for the report and review.
Thanks to all folks for checking this patch on existing projects.
Thanks Florian Apolloner and Markus Holtermann for the discussion and
implementation idea.
Regression in 0b79eb3691
.
Backport of b55699968f
from main.
2021-05-13 09:00:25 +02:00
Mariusz Felisiak
3ba089ac7e
[2.2.x] Refs #32718 -- Corrected CVE-2021-31542 release notes.
...
Backport of d1f1417cae
from main.
2021-05-12 10:44:25 +02:00
Mariusz Felisiak
88d9b28c0c
[2.2.x] Added CVE-2021-32052 to security archive.
...
Backport of efebcc429f
from main
2021-05-06 10:05:46 +02:00
Mariusz Felisiak
d9594c4ea5
[2.2.x] Fixed #32713 , Fixed CVE-2021-32052 -- Prevented newlines and tabs from being accepted in URLValidator on Python 3.9.5+.
...
In Python 3.9.5+ urllib.parse() automatically removes ASCII newlines
and tabs from URLs [1, 2]. Unfortunately it created an issue in
the URLValidator. URLValidator uses urllib.urlsplit() and
urllib.urlunsplit() for creating a URL variant with Punycode which no
longer contains newlines and tabs in Python 3.9.5+. As a consequence,
the regular expression matched the URL (without unsafe characters) and
the source value (with unsafe characters) was considered valid.
[1] https://bugs.python.org/issue43882 and
[2] 76cd81d603
Backport of e1e81aa1c4
from main.
2021-05-06 08:53:27 +02:00
Carlton Gibson
bcafd9ba84
[2.2.x] Added CVE-2021-31542 to security archive.
...
Backport of 607ebbfba9
and
62b2e8b37e
from main
2021-05-04 11:14:17 +02:00
Florian Apolloner
04ac1624bd
[2.2.x] Fixed CVE-2021-31542 -- Tightened path & file name sanitation in file uploads.
2021-04-27 19:10:08 +02:00
Mariusz Felisiak
7f1b088ab4
[2.2.x] Added CVE-2021-28658 to security archive.
...
Backport of 1eac8468cb
from main
2021-04-06 09:48:05 +02:00
Mariusz Felisiak
4036d62bda
[2.2.x] Fixed CVE-2021-28658 -- Fixed potential directory-traversal via uploaded files.
...
Thanks Claude Paroz for the initial patch.
Thanks Dennis Brinkrolf for the report.
Backport of d4d800ca1a
from main.
2021-04-06 08:38:19 +02:00
Carlton Gibson
6e58828f8b
[2.2.x] Added CVE-2021-23336 to security archive.
...
Backport of ab58f07250
from master
2021-02-19 11:07:56 +01:00
Nick Pope
fd6b6afd59
[2.2.x] Fixed CVE-2021-23336 -- Fixed web cache poisoning via django.utils.http.limited_parse_qsl().
2021-02-18 10:27:25 +01:00
Nick Pope
226d831918
[2.2.x] Added documentation extlink for bugs.python.org.
...
Backport of d02d60eb0f
from master
2021-02-17 14:28:05 +01:00
Mariusz Felisiak
34010d8ffa
[2.2.x] Added CVE-2021-3281 to security archive.
...
Backport of f749148d62
from master
2021-02-01 10:47:08 +01:00
Mariusz Felisiak
21e7622dec
[2.2.x] Fixed CVE-2021-3281 -- Fixed potential directory-traversal via archive.extract().
...
Thanks Florian Apolloner, Shai Berger, and Simon Charette for reviews.
Thanks Wang Baohua for the report.
Backport of 05413afa8c
from master.
2021-02-01 09:14:54 +01:00
Carlton Gibson
3db9a7aa8b
[2.2.x] Set release date for 2.2.17.
...
Backport of 7fc07b9b2b
from master
2020-11-02 08:39:12 +01:00
Mariusz Felisiak
b4b8ca4895
[2.2.x] Refs #31040 -- Doc'd Python 3.9 compatibility.
...
Backport of e18156b6c3
from master.
2020-10-13 08:45:37 +02:00
Carlton Gibson
0f6e73e567
[2.2.x] Added CVE-2020-24583 & CVE-2020-24584 to security archive.
...
Backport of d5b526bf78
from master
2020-09-01 11:39:59 +02:00
Carlton Gibson
65078cf060
[2.2.x] Added CVE-2020-13254 and CVE-2020-13596 to security archive.
...
Backport of 54975780ee
from master
2020-09-01 11:39:57 +02:00
Carlton Gibson
dfcecb6e6c
[2.2.x] Added release date for 2.2.16.
...
Backport of 976e2b7420
from master
2020-09-01 10:00:28 +02:00
Mariusz Felisiak
a3aebfdc81
[2.2.x] Fixed CVE-2020-24584 -- Fixed permission escalation in intermediate-level directories of the file system cache on Python 3.7+.
...
Backport of f56b57976133129b0b351a38bba4ac882badabf0 from master.
2020-08-25 11:09:40 +02:00
Mariusz Felisiak
375657a71c
[2.2.x] Fixed CVE-2020-24583, #31921 -- Fixed permissions on intermediate-level static and storage directories on Python 3.7+.
...
Thanks WhiteSage for the report.
Backport of ea0febbba531a3ecc8c77b570efbfb68ca7155db from master.
2020-08-25 10:59:42 +02:00
Mariusz Felisiak
dc39e62e6b
[2.2.x] Refs #31863 -- Added release notes for 94ea79be13
.
...
Backport of 21768a99f4
from master
2020-08-13 16:32:58 +02:00
Daniel Hillier
839f906a23
[2.2.x] Fixed #31866 -- Fixed locking proxy models in QuerySet.select_for_update(of=()).
...
Backport of 60626162f7
from master
2020-08-11 12:33:18 +02:00
Mariusz Felisiak
30706246e7
[2.2.x] Added stub release notes for 2.2.16.
...
Backport of 8a5683b6b2
from master
2020-08-11 11:14:35 +02:00
Mariusz Felisiak
b70595c94c
[2.2.x] Added release date for 2.2.15.
...
Backport of b68b8cb89a
from master
2020-08-03 08:58:00 +02:00
Florian Apolloner
1a3835fdf3
[2.2.x] Fixed #31784 -- Fixed crash when sending emails on Python 3.6.11+, 3.7.8+, and 3.8.4+.
...
Fixed sending emails crash on email addresses with display names longer
then 75 chars on Python 3.6.11+, 3.7.8+, and 3.8.4+.
Wrapped display names were passed to email.headerregistry.Address()
what caused raising an exception because address parts cannot contain
CR or LF.
See https://bugs.python.org/issue39073
Co-Authored-By: Mariusz Felisiak <felisiak.mariusz@gmail.com>
Backport of 96a3ea39ef
from master.
2020-07-20 08:11:30 +02:00
Mariusz Felisiak
f1a6e6c817
[2.2.x] Fixed #31790 -- Fixed setting SameSite cookies flag in HttpResponse.delete_cookie().
...
Cookies with the "SameSite" flag set to None and without the "secure"
flag will be soon rejected by latest browser versions.
This affects sessions and messages cookies.
Backport of 331324ecce
from stable/3.0.x
2020-07-16 09:35:35 +02:00