aboutsummaryrefslogtreecommitdiffstats
path: root/english/lts/security/2021/dla-2651.wml
blob: d75103ba2a0690863d4438490f82330b8d0787b0 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>

<p>It was discovered that there was potential directory-traversal vulnerability
in Django, a popular Python-based web development framework.</p>

<p>The MultiPartParser, UploadedFile and FieldFile classes allowed
directory-traversal via uploaded files with suitably crafted file names. In
order to mitigate this risk, stricter basename and path sanitation is now
applied. Specifically, empty file names and paths with dot segments are
rejected.</p>

<ul>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31542">CVE-2021-31542</a></li>

</ul>

<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
1:1.10.7-2+deb9u13.</p>

<p>We recommend that you upgrade your python-django packages.</p>

<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2021/dla-2651.data"
# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy