Copied from
ubuntu hirsute in
Private PPA for Ubuntu Security Team
by Marc Deslauriers
Changelog
python-django (2:2.2.20-1ubuntu0.2) hirsute-security; urgency=medium
* SECURITY UPDATE: header injection in URLValidator with Python 3.9.5+
- debian/patches/CVE-2021-32052.patch: prevent newlines and tabs from
being accepted in URLValidator in django/core/validators.py,
tests/validators/tests.py.
- CVE-2021-32052
* SECURITY UPDATE: potential directory traversal via admindocs
- debian/patches/CVE-2021-33203.patch: use safe_join in
django/contrib/admindocs/views.py, tests/admin_docs/test_views.py.
- CVE-2021-33203
* SECURITY UPDATE: possible indeterminate SSRF, RFI, and LFI attacks
since validators accepted leading zeros in IPv4 addresses
- debian/patches/CVE-2021-33571.patch: prevent leading zeros in IPv4
addresses in django/core/validators.py,
tests/validators/invalid_urls.txt, tests/validators/tests.py,
tests/validators/valid_urls.txt.
- CVE-2021-33571
-- Marc Deslauriers <email address hidden> Wed, 26 May 2021 08:52:14 -0400