diff options
| author | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2021-01-22 12:23:18 +0100 |
|---|---|---|
| committer | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2021-02-01 09:13:58 +0100 |
| commit | 02e6592835b4559909aa3aaaf67988fef435f624 (patch) | |
| tree | b90a7513252dec0aebc82eeccbc86257e6418a5a /docs/releases/2.2.18.txt | |
| parent | 03a86784d0dbfc5890f5aaba2d2f29c1deb0009d (diff) | |
[3.1.x] Fixed CVE-2021-3281 -- Fixed potential directory-traversal via archive.extract().
Thanks Florian Apolloner, Shai Berger, and Simon Charette for reviews.
Thanks Wang Baohua for the report.
Backport of 05413afa8c18cdb978fcdf470e09f7a12b234a23 from master.
Diffstat (limited to 'docs/releases/2.2.18.txt')
| -rw-r--r-- | docs/releases/2.2.18.txt | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/docs/releases/2.2.18.txt b/docs/releases/2.2.18.txt new file mode 100644 index 0000000000..45df4fb83c --- /dev/null +++ b/docs/releases/2.2.18.txt @@ -0,0 +1,15 @@ +=========================== +Django 2.2.18 release notes +=========================== + +*February 1, 2021* + +Django 2.2.18 fixes a security issue with severity "low" in 2.2.17. + +CVE-2021-3281: Potential directory-traversal via ``archive.extract()`` +====================================================================== + +The ``django.utils.archive.extract()`` function, used by +:option:`startapp --template` and :option:`startproject --template`, allowed +directory-traversal via an archive with absolute paths or relative paths with +dot segments. |
