mirror of
https://github.com/django/django.git
synced 2025-10-31 09:41:08 +00:00
Refs CVE-2021-23336 -- Updated tests and release notes for affected versions.
This commit is contained in:
committed by
Carlton Gibson
parent
96a5093400
commit
0ad9fa02e0
16
docs/releases/2.2.19.txt
Normal file
16
docs/releases/2.2.19.txt
Normal file
@@ -0,0 +1,16 @@
|
||||
===========================
|
||||
Django 2.2.19 release notes
|
||||
===========================
|
||||
|
||||
*February 19, 2021*
|
||||
|
||||
Django 2.2.19 fixes a security issue in 2.2.18.
|
||||
|
||||
CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()``
|
||||
=================================================================================
|
||||
|
||||
Django contains a copy of :func:`urllib.parse.parse_qsl` which was added to
|
||||
backport some security fixes. A further security fix has been issued recently
|
||||
such that ``parse_qsl()`` no longer allows using ``;`` as a query parameter
|
||||
separator by default. Django now includes this fix. See :bpo:`42967` for
|
||||
further details.
|
||||
Reference in New Issue
Block a user