Commit Graph

27039 Commits

Author SHA1 Message Date
Mariusz Felisiak 573e70ea48 [2.2.x] Added CVE-2021-44420 to security archive.
Backport of 8747052411 from main
2021-12-07 08:56:25 +01:00
Mariusz Felisiak 8439938602 [2.2.x] Post-release version bump. 2021-12-07 07:05:38 +01:00
Mariusz Felisiak 79d8dcefb2 [2.2.x] Bumped version for 2.2.25 release. 2021-12-07 07:03:33 +01:00
Florian Apolloner 7cf7d74e8a [2.2.x] Fixed #30530, CVE-2021-44420 -- Fixed potential bypass of an upstream access control based on URL paths.
Thanks Sjoerd Job Postmus and TengMA(@te3t123) for reports.

Backport of d4dcd5b9dd from main.
2021-12-07 07:02:14 +01:00
Mariusz Felisiak 0007a5f9fa [2.2.x] Added requirements.txt to files ignored by Sphinx builds.
Backport of 0cf2d48ba8 from stable/3.2.x.
2021-11-30 12:12:07 +01:00
Mariusz Felisiak fac0fdd95d [2.2.x] Added stub release notes for 2.2.25.
Backport of ae4077e13e from main.
2021-11-30 11:31:56 +01:00
Mariusz Felisiak 4bc10b7955 [2.2.x] Fixed crash building HTML docs since Sphinx 4.3.
See dd2ff3e911.
Backport of f0480ddd2d from main
2021-11-18 13:33:29 +01:00
Adam Johnson 5289fcfffe [2.2.x] Configured Read The Docs to build all formats.
`all` acts as an alias for all formats ([docs](https://docs.readthedocs.io/en/stable/config-file/v2.html#formats)). Whilst there are only three formats right now, this would auto expand to other formats in the future, which seems desirable?
Backport of 1fe23bdd29 from main
2021-11-18 12:25:47 +01:00
Carlton Gibson 9a4a2b2089 [2.2.x] Refs #33247 -- Corrected configuration for Read The Docs.
This pins Sphinx version, because the default Sphinx version used by
RTD is not compatible with Python 3.8+.

This also, sets Python 3.8 for RTD builds which is compatible with all
current versions of Django.

Thanks to Mariusz Felisiak for the suggestion.

Backport of 447b6c866f from main.
2021-11-03 19:05:19 +01:00
Carlton Gibson 029c830b71 [2.2.x] Fixed #33247 -- Added configuration for Read The Docs.
Co-authored-by: Andrew Neitsch <andrew@neitsch.ca>

Backport of 0da7a2e9da from main
2021-11-03 19:04:59 +01:00
Mariusz Felisiak 12141e3116
[2.2.x] Refs #32856 -- Clarified that psycopg2 < 2.9 is required.
Follow up to 837ffcfa68.
2021-11-03 08:42:27 +01:00
Mariusz Felisiak cf63dd5c1b [2.2.x] Added 'formatter' to spelling wordlist.
Backport of e43a131887 from main
2021-10-12 15:18:17 +02:00
Mariusz Felisiak 05bc1c81aa [2.2.x] Fixed #33082 -- Fixed CommandTests.test_subparser_invalid_option on Python 3.9.7+.
Thanks Michał Górny for the report.

Backport of 50ed545e2f from main.
2021-09-02 11:06:10 +02:00
Mariusz Felisiak a9c0aa11e7 [2.2.x] Refs #31676 -- Updated technical board description in organization docs.
According to DEP 0010.

Backport of f2ed2211c2 from main.
2021-07-30 11:53:15 +02:00
Mariusz Felisiak 66008c2af0 [2.2.x] Refs #31676 -- Added Mergers and Releasers to organization docs.
According to DEP 0010.

Backport of 228ec8e015 from main
2021-07-30 11:52:46 +02:00
Mariusz Felisiak d4d1c2b3db [2.2.x] Refs #31676 -- Removed Core team from organization docs.
According to DEP 0010.

Backport of caa2dd08c4 from main
2021-07-30 11:52:43 +02:00
Mariusz Felisiak 8f59f72a20 [2.2.x] Refs #31676 -- Removed Django Core-Mentorship mailing list references in docs.
Backport of 37e8367c35 from main.
2021-07-13 20:26:17 +02:00
Mariusz Felisiak 837ffcfa68
[2.2.x] Refs #32856 -- Doc'd that psycopg2 < 2.9 is required. 2021-06-21 13:06:31 +02:00
Mariusz Felisiak dc43667eab [2.2.x] Fixed docs header underlines in security archive.
Backport of d9cee3f5f2 from main
2021-06-02 12:29:11 +02:00
Carlton Gibson 3e7bb564be [2.2.x] Added CVE-2021-33203 and CVE-2021-33571 to security archive.
Backport of a39f235ca4 from main
2021-06-02 11:19:59 +02:00
Carlton Gibson 48bde7cab4 [2.2.x] Post-release version bump. 2021-06-02 10:36:52 +02:00
Carlton Gibson 2da029d854 [2.2.x] Bumped version for 2.2.24 release. 2021-06-02 10:28:20 +02:00
Mariusz Felisiak f27c38ab5d [2.2.x] Fixed CVE-2021-33571 -- Prevented leading zeros in IPv4 addresses.
validate_ipv4_address() was affected only on Python < 3.9.5, see [1].
URLValidator() uses a regular expressions and it was affected on all
Python versions.

[1] https://bugs.python.org/issue36384
2021-06-02 10:26:22 +02:00
Florian Apolloner 053cc9534d [2.2.x] Fixed CVE-2021-33203 -- Fixed potential path-traversal via admindocs' TemplateDetailView. 2021-06-02 10:26:22 +02:00
Carlton Gibson 6229d8794f [2.2.x] Confirmed release date for Django 2.2.24.
Backport of f66ae7a2d5 from main.
2021-06-02 10:23:20 +02:00
Carlton Gibson f163ad5c63 [2.2.x] Added stub release notes and date for Django 2.2.24.
Backport of b46dbd4e3e from main
2021-05-26 10:21:53 +02:00
Mariusz Felisiak bed1755bc5 [2.2.x] Changed IRC references to Libera.Chat.
Backport of 66491f08fe from main.
2021-05-20 12:42:48 +02:00
Mariusz Felisiak 63f0d7a0f6 [2.2.x] Refs #32718 -- Fixed file_storage.test_generate_filename and model_fields.test_filefield tests on Python 3.5. 2021-05-14 06:59:11 +02:00
Mariusz Felisiak 5fe4970bd0 [2.2.x] Post-release version bump. 2021-05-13 09:22:34 +02:00
Mariusz Felisiak 61f814f9fa [2.2.x] Bumped version for 2.2.23 release. 2021-05-13 09:19:56 +02:00
Mariusz Felisiak b8ecb06436 [2.2.x] Fixed #32718 -- Relaxed file name validation in FileField.
- Validate filename returned by FileField.upload_to() not a filename
  passed to the FileField.generate_filename() (upload_to() may
  completely ignored passed filename).
- Allow relative paths (without dot segments) in the generated filename.

Thanks to Jakub Kleň for the report and review.
Thanks to all folks for checking this patch on existing projects.
Thanks Florian Apolloner and Markus Holtermann for the discussion and
implementation idea.

Regression in 0b79eb3691.

Backport of b55699968f from main.
2021-05-13 09:00:25 +02:00
Mariusz Felisiak 3ba089ac7e [2.2.x] Refs #32718 -- Corrected CVE-2021-31542 release notes.
Backport of d1f1417cae from main.
2021-05-12 10:44:25 +02:00
Mariusz Felisiak 88d9b28c0c [2.2.x] Added CVE-2021-32052 to security archive.
Backport of efebcc429f from main
2021-05-06 10:05:46 +02:00
Mariusz Felisiak 7ada1f90c6 [2.2.x] Post-release version bump. 2021-05-06 09:10:34 +02:00
Mariusz Felisiak df9fd4661e [2.2.x] Bumped version for 2.2.22 release. 2021-05-06 09:08:28 +02:00
Mariusz Felisiak d9594c4ea5 [2.2.x] Fixed #32713, Fixed CVE-2021-32052 -- Prevented newlines and tabs from being accepted in URLValidator on Python 3.9.5+.
In Python 3.9.5+ urllib.parse() automatically removes ASCII newlines
and tabs from URLs [1, 2]. Unfortunately it created an issue in
the URLValidator. URLValidator uses urllib.urlsplit() and
urllib.urlunsplit() for creating a URL variant with Punycode which no
longer contains newlines and tabs in Python 3.9.5+. As a consequence,
the regular expression matched the URL (without unsafe characters) and
the source value (with unsafe characters) was considered valid.

[1] https://bugs.python.org/issue43882 and
[2] 76cd81d603

Backport of e1e81aa1c4 from main.
2021-05-06 08:53:27 +02:00
Carlton Gibson 163700388c [2.2.x] Refs CVE-2021-31542 -- Skipped mock AWS storage test on Windows.
The validate_file_name() sanitation introduced in
0b79eb3691 correctly rejects the example
file name as containing path elements on Windows. This breaks the test
introduced in 914c72be2a to allow path
components for storages that may allow them.

Test is skipped pending a discussed storage refactoring to support this
use-case.

Backport of a708f39ce6 from main
2021-05-06 07:44:15 +02:00
Carlton Gibson bcafd9ba84 [2.2.x] Added CVE-2021-31542 to security archive.
Backport of 607ebbfba9 and
62b2e8b37e from main
2021-05-04 11:14:17 +02:00
Carlton Gibson 3931dc7651 [2.2.x] Post-release version bump. 2021-05-04 10:24:07 +02:00
Carlton Gibson ff1385ae45 [2.2.x] Bumped version for 2.2.21 release. 2021-05-04 10:18:53 +02:00
Florian Apolloner 04ac1624bd [2.2.x] Fixed CVE-2021-31542 -- Tightened path & file name sanitation in file uploads. 2021-04-27 19:10:08 +02:00
Mariusz Felisiak 7f1b088ab4 [2.2.x] Added CVE-2021-28658 to security archive.
Backport of 1eac8468cb from main
2021-04-06 09:48:05 +02:00
Mariusz Felisiak e95fbb6a76 [2.2.x] Post-release version bump. 2021-04-06 08:45:22 +02:00
Mariusz Felisiak ad9fa56a17 [2.2.x] Bumped version for 2.2.20 release. 2021-04-06 08:39:37 +02:00
Mariusz Felisiak 4036d62bda [2.2.x] Fixed CVE-2021-28658 -- Fixed potential directory-traversal via uploaded files.
Thanks Claude Paroz for the initial patch.
Thanks Dennis Brinkrolf for the report.

Backport of d4d800ca1a from main.
2021-04-06 08:38:19 +02:00
Carlton Gibson 6e58828f8b [2.2.x] Added CVE-2021-23336 to security archive.
Backport of ab58f07250 from master
2021-02-19 11:07:56 +01:00
Carlton Gibson 1fb4628a83 [2.2.x] Post-release version bump. 2021-02-19 09:45:49 +01:00
Carlton Gibson 21a5547793 [2.2.x] Bumped version for 2.2.19 release. 2021-02-19 09:44:55 +01:00
Nick Pope fd6b6afd59 [2.2.x] Fixed CVE-2021-23336 -- Fixed web cache poisoning via django.utils.http.limited_parse_qsl(). 2021-02-18 10:27:25 +01:00
Nick Pope 226d831918 [2.2.x] Added documentation extlink for bugs.python.org.
Backport of d02d60eb0f from master
2021-02-17 14:28:05 +01:00