Debian 10219 Published by

A python-django security update has been released for Debian GNU/Linux 9 LTS to address a potential directory-traversal vulnerability.



DLA 2651-1: python-django security update



- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2651-1 debian-lts@lists.debian.org
  https://www.debian.org/lts/security/ Chris Lamb
May 06, 2021   https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : python-django
Version : 1:1.10.7-2+deb9u13
CVE ID : CVE-2021-31542
Debian Bug : #988053

It was discovered that there was potential directory-traversal
vulnerability in Django, a popular Python-based web development
framework.

The MultiPartParser, UploadedFile and FieldFile classes allowed
directory-traversal via uploaded files with suitably crafted file
names. In order to mitigate this risk, stricter basename and path
sanitation is now applied. Specifically, empty file names and paths
with dot segments are rejected.

For Debian 9 "Stretch", this problem has been fixed in version
1:1.10.7-2+deb9u13.

We recommend that you upgrade your python-django packages.

For the detailed security status of python-django please refer to
its security tracker page at:
  https://security-tracker.debian.org/tracker/python-django

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://wiki.debian.org/LTS