mirror of
https://github.com/django/django.git
synced 2025-10-26 07:06:08 +00:00
[3.2.x] Fixed CVE-2021-23336 -- Fixed web cache poisoning via django.utils.http.parse_qsl().
This commit is contained in:
committed by
Carlton Gibson
parent
0debc6ba5b
commit
be8237c7cc
16
docs/releases/2.2.19.txt
Normal file
16
docs/releases/2.2.19.txt
Normal file
@@ -0,0 +1,16 @@
|
||||
===========================
|
||||
Django 2.2.19 release notes
|
||||
===========================
|
||||
|
||||
*February 19, 2021*
|
||||
|
||||
Django 2.2.19 fixes a security issue in 2.2.18.
|
||||
|
||||
CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()``
|
||||
=================================================================================
|
||||
|
||||
Django contains a copy of :func:`urllib.parse.parse_qsl` which was added to
|
||||
backport some security fixes. A further security fix has been issued recently
|
||||
such that ``parse_qsl()`` no longer allows using ``;`` as a query parameter
|
||||
separator by default. Django now includes this fix. See :bpo:`42967` for
|
||||
further details.
|
||||
16
docs/releases/3.0.13.txt
Normal file
16
docs/releases/3.0.13.txt
Normal file
@@ -0,0 +1,16 @@
|
||||
===========================
|
||||
Django 3.0.13 release notes
|
||||
===========================
|
||||
|
||||
*February 19, 2021*
|
||||
|
||||
Django 3.0.13 fixes a security issue in 3.0.12.
|
||||
|
||||
CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()``
|
||||
=================================================================================
|
||||
|
||||
Django contains a copy of :func:`urllib.parse.parse_qsl` which was added to
|
||||
backport some security fixes. A further security fix has been issued recently
|
||||
such that ``parse_qsl()`` no longer allows using ``;`` as a query parameter
|
||||
separator by default. Django now includes this fix. See :bpo:`42967` for
|
||||
further details.
|
||||
@@ -2,9 +2,18 @@
|
||||
Django 3.1.7 release notes
|
||||
==========================
|
||||
|
||||
*Expected March 1, 2021*
|
||||
*February 19, 2021*
|
||||
|
||||
Django 3.1.7 fixes several bugs in 3.1.6.
|
||||
Django 3.1.7 fixes a security issue and a bug in 3.1.6.
|
||||
|
||||
CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()``
|
||||
=================================================================================
|
||||
|
||||
Django contains a copy of :func:`urllib.parse.parse_qsl` which was added to
|
||||
backport some security fixes. A further security fix has been issued recently
|
||||
such that ``parse_qsl()`` no longer allows using ``;`` as a query parameter
|
||||
separator by default. Django now includes this fix. See :bpo:`42967` for
|
||||
further details.
|
||||
|
||||
Bugfixes
|
||||
========
|
||||
|
||||
@@ -46,6 +46,7 @@ versions of the documentation contain the release notes for any later releases.
|
||||
.. toctree::
|
||||
:maxdepth: 1
|
||||
|
||||
3.0.13
|
||||
3.0.12
|
||||
3.0.11
|
||||
3.0.10
|
||||
@@ -65,6 +66,7 @@ versions of the documentation contain the release notes for any later releases.
|
||||
.. toctree::
|
||||
:maxdepth: 1
|
||||
|
||||
2.2.19
|
||||
2.2.18
|
||||
2.2.17
|
||||
2.2.16
|
||||
|
||||
Reference in New Issue
Block a user