Package: python-django / 2:2.2.28-1~deb11u2
Metadata
Package | Version | Patches format |
---|---|---|
python-django | 2:2.2.28-1~deb11u2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 disable sources in sphinxdoc.diff | (download) |
docs/conf.py |
5 4 + 1 - 0 ! |
disable creation of _sources directory by sphinx We do this to save some space as the sources of the documentation are not really useful in a binary package. . This is a Debian specific patch. |
0002 use_debian_geoip_database_as_default.diff | (download) |
django/contrib/gis/geoip2/base.py |
9 6 + 3 - 0 ! |
use debian geoip database path as default Default to Debian standard path for GeoIP directory and for GeoIP city file. Avoids the need to declare them in each project. . This is a Debian specific patch. Bug-Debian: http://bugs.debian.org/645094 |
0004 Use locally installed documentation sources.patch | (download) |
docs/conf.py |
6 3 + 3 - 0 ! |
use locally installed documentation sources |
0004 Set the default shebang to new projects to use Pytho.patch | (download) |
django/conf/project_template/manage.py-tpl |
2 1 + 1 - 0 ! |
set the default shebang to new projects to use python 3. |
0005 Use usr bin env python3 shebang for django admin.py.patch | (download) |
django/bin/django-admin.py |
2 1 + 1 - 0 ! |
use #!/usr/bin/env python3 shebang for django-admin.py. |
0006 Moved RequestSite import to the toplevel.patch | (download) |
django/contrib/sites/shortcuts.py |
7 4 + 3 - 0 ! |
moved requestsite import to the toplevel. Via https://github.com/django/django/commit/78163d1ac4407d59bfc5fdf1f84f2dbbb2ed3443 |
0007 fix url validator.patch | (download) |
django/core/validators.py |
13 7 + 6 - 0 ! |
fixed urlvalidator crash in some edge cases |
CVE 2022 34265.patch | (download) |
django/db/backends/base/operations.py |
3 3 + 0 - 0 ! |
[patch] fixed cve-2022-34265 -- protected Trunc(kind)/Extract(lookup_name) against SQL injection. Thanks Takuto Yoshikai (Aeye Security Lab) for the report. |
CVE 2022 36359.patch | (download) |
django/http/response.py |
4 3 + 1 - 0 ! |
[patch] fixed cve-2022-36359 -- escaped filename in Content-Disposition header. Thanks to Motoyasu Saburi for the report. |
CVE 2022 41323.patch | (download) |
django/urls/resolvers.py |
2 1 + 1 - 0 ! |
[patch] fixed cve-2022-41323 -- prevented locales being interpreted as regular expressions. Thanks to Benjamin Balder Bach for the report. |
CVE 2023 36053.patch | (download) |
django/core/validators.py |
7 6 + 1 - 0 ! |
[patch] [3.2.x] fixed cve-2023-36053 -- prevented potential redos in EmailValidator and URLValidator. Thanks Seokchan Yoon for reports. |
CVE 2023 31047.patch | (download) |
django/forms/widgets.py |
26 25 + 1 - 0 ! |
[patch] [3.2.x] fixed cve-2023-31047, Fixed #31710 -- Prevented potential bypass of validation when uploading multiple files using one form field. Thanks Moataz Al-Sharida and nawaik for reports. Co-authored-by: Shai Berger <shai@platonix.com> Co-authored-by: nessita <124304+nessita@users.noreply.github.com> |
CVE 2023 24580.patch | (download) |
django/conf/global_settings.py |
4 4 + 0 - 0 ! |
[patch] fixed cve-2023-24580 -- prevented dos with too many uploaded files. Thanks to Jakob Ackermann for the report. |
CVE 2023 23969.patch | (download) |
django/utils/translation/trans_real.py |
32 31 + 1 - 0 ! |
[patch] [3.2.x] fixed cve-2023-23969 -- prevented dos with pathological values for Accept-Language. The parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large. Accept-Language headers are now limited to a maximum length in order to avoid this issue. |