diff options
| author | Nick Pope <nick@nickpope.me.uk> | 2021-02-16 10:14:17 +0000 |
|---|---|---|
| committer | Carlton Gibson <carlton.gibson@noumenal.es> | 2021-02-18 10:15:30 +0100 |
| commit | 8f6d431b08cbb418d9144b976e7b972546607851 (patch) | |
| tree | 35d315127b71d1927f311e9b506bbe87b960727f /docs | |
| parent | 536d1174bba83a03f4d417b238918f52536da83b (diff) | |
[3.1.x] Fixed CVE-2021-23336 -- Fixed web cache poisoning via django.utils.http.limited_parse_qsl().
Diffstat (limited to 'docs')
| -rw-r--r-- | docs/releases/2.2.19.txt | 16 | ||||
| -rw-r--r-- | docs/releases/3.0.13.txt | 16 | ||||
| -rw-r--r-- | docs/releases/3.1.7.txt | 13 | ||||
| -rw-r--r-- | docs/releases/index.txt | 2 |
4 files changed, 45 insertions, 2 deletions
diff --git a/docs/releases/2.2.19.txt b/docs/releases/2.2.19.txt new file mode 100644 index 0000000000..feaffd996c --- /dev/null +++ b/docs/releases/2.2.19.txt @@ -0,0 +1,16 @@ +=========================== +Django 2.2.19 release notes +=========================== + +*February 19, 2021* + +Django 2.2.19 fixes a security issue in 2.2.18. + +CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()`` +================================================================================= + +Django contains a copy of :func:`urllib.parse.parse_qsl` which was added to +backport some security fixes. A further security fix has been issued recently +such that ``parse_qsl()`` no longer allows using ``;`` as a query parameter +separator by default. Django now includes this fix. See :bpo:`42967` for +further details. diff --git a/docs/releases/3.0.13.txt b/docs/releases/3.0.13.txt new file mode 100644 index 0000000000..c78b8a04fd --- /dev/null +++ b/docs/releases/3.0.13.txt @@ -0,0 +1,16 @@ +=========================== +Django 3.0.13 release notes +=========================== + +*February 19, 2021* + +Django 3.0.13 fixes a security issue in 3.0.12. + +CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()`` +================================================================================= + +Django contains a copy of :func:`urllib.parse.parse_qsl` which was added to +backport some security fixes. A further security fix has been issued recently +such that ``parse_qsl()`` no longer allows using ``;`` as a query parameter +separator by default. Django now includes this fix. See :bpo:`42967` for +further details. diff --git a/docs/releases/3.1.7.txt b/docs/releases/3.1.7.txt index 1ef16b76c7..e58fc23e80 100644 --- a/docs/releases/3.1.7.txt +++ b/docs/releases/3.1.7.txt @@ -2,9 +2,18 @@ Django 3.1.7 release notes ========================== -*Expected March 1, 2021* +*February 19, 2021* -Django 3.1.7 fixes several bugs in 3.1.6. +Django 3.1.7 fixes a security issue and a bug in 3.1.6. + +CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()`` +================================================================================= + +Django contains a copy of :func:`urllib.parse.parse_qsl` which was added to +backport some security fixes. A further security fix has been issued recently +such that ``parse_qsl()`` no longer allows using ``;`` as a query parameter +separator by default. Django now includes this fix. See :bpo:`42967` for +further details. Bugfixes ======== diff --git a/docs/releases/index.txt b/docs/releases/index.txt index dd246f00a3..8bd30dc7b4 100644 --- a/docs/releases/index.txt +++ b/docs/releases/index.txt @@ -39,6 +39,7 @@ versions of the documentation contain the release notes for any later releases. .. toctree:: :maxdepth: 1 + 3.0.13 3.0.12 3.0.11 3.0.10 @@ -58,6 +59,7 @@ versions of the documentation contain the release notes for any later releases. .. toctree:: :maxdepth: 1 + 2.2.19 2.2.18 2.2.17 2.2.16 |
