diff options
| author | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2021-01-22 12:23:18 +0100 |
|---|---|---|
| committer | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2021-02-01 09:07:36 +0100 |
| commit | 05413afa8c18cdb978fcdf470e09f7a12b234a23 (patch) | |
| tree | d3672ac9ec790440c7f4fb3984b8c3d40136c8f8 /docs/releases/2.2.18.txt | |
| parent | 6822aa5c6c3fbec7c5393a05e990865ba59fe167 (diff) | |
Fixed CVE-2021-3281 -- Fixed potential directory-traversal via archive.extract().
Thanks Florian Apolloner, Shai Berger, and Simon Charette for reviews.
Thanks Wang Baohua for the report.
Diffstat (limited to 'docs/releases/2.2.18.txt')
| -rw-r--r-- | docs/releases/2.2.18.txt | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/docs/releases/2.2.18.txt b/docs/releases/2.2.18.txt new file mode 100644 index 0000000000..45df4fb83c --- /dev/null +++ b/docs/releases/2.2.18.txt @@ -0,0 +1,15 @@ +=========================== +Django 2.2.18 release notes +=========================== + +*February 1, 2021* + +Django 2.2.18 fixes a security issue with severity "low" in 2.2.17. + +CVE-2021-3281: Potential directory-traversal via ``archive.extract()`` +====================================================================== + +The ``django.utils.archive.extract()`` function, used by +:option:`startapp --template` and :option:`startproject --template`, allowed +directory-traversal via an archive with absolute paths or relative paths with +dot segments. |
