- ------------------------------------------------------------------------- Debian LTS Advisory DLA-2651-1 [email protected] https://www.debian.org/lts/security/ Chris Lamb May 06, 2021 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : python-django Version : 1:1.10.7-2+deb9u13 CVE ID : CVE-2021-31542 Debian Bug : #988053 It was discovered that there was potential directory-traversal vulnerability in Django, a popular Python-based web development framework. The MultiPartParser, UploadedFile and FieldFile classes allowed directory-traversal via uploaded files with suitably crafted file names. In order to mitigate this risk, stricter basename and path sanitation is now applied. Specifically, empty file names and paths with dot segments are rejected. For Debian 9 "Stretch", this problem has been fixed in version 1:1.10.7-2+deb9u13. We recommend that you upgrade your python-django packages. For the detailed security status of python-django please refer to its security tracker page at: https://security-tracker.debian.org/tracker/python-django Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS