Package: python-django / 3:3.2.25-0+deb12u1
Metadata
| Package | Version | Patches format |
|---|---|---|
| python-django | 3:3.2.25-0+deb12u1 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| 0001 disable sources in sphinxdoc.diff | (download) |
docs/conf.py |
5 4 + 1 - 0 ! |
disable creation of _sources directory by sphinx We do this to save some space as the sources of the documentation are not really useful in a binary package. . This is a Debian specific patch. |
| 0002 use_debian_geoip_database_as_default.diff | (download) |
django/contrib/gis/geoip2/base.py |
9 6 + 3 - 0 ! |
use debian geoip database path as default Default to Debian standard path for GeoIP directory and for GeoIP city file. Avoids the need to declare them in each project. . This is a Debian specific patch. Bug-Debian: http://bugs.debian.org/645094 |
| 0004 Use locally installed documentation sources.patch | (download) |
docs/conf.py |
6 3 + 3 - 0 ! |
use locally installed documentation sources |
| 0004 Set the default shebang to new projects to use Pytho.patch | (download) |
django/conf/project_template/manage.py-tpl |
2 1 + 1 - 0 ! |
set the default shebang to new projects to use python 3. |
| 0005 Use usr bin env python3 shebang for django admin.py.patch | (download) |
django/bin/django-admin.py |
2 1 + 1 - 0 ! |
use #!/usr/bin/env python3 shebang for django-admin.py. |
| 0006 Fixed 32690 Fixed __in lookup crash when combining w.patch | (download) |
django/db/models/lookups.py |
9 9 + 0 - 0 ! |
fixed #32690 -- fixed __in lookup crash when combining with filtered aggregates. Having lookups group by subquery right-hand-sides is likely unnecessary in the first place but relatively large amount of work would be needed to achieve that such as making Lookup instances proper resolvable expressions. Regression in 35431298226165986ad07e91f9d3aca721ff38ec. Thanks James A. Munsch for the report. (cherry picked from commit 136ff592ad8aa8b7fa1e61435e5501cc98ce8573) |
| 0007 Refs 32786 Made Query.clear_ordering not to cause si.patch | (download) |
django/db/models/query.py |
8 4 + 4 - 0 ! |
refs #32786 -- made query.clear_ordering() not to cause side effects by default. (cherry picked from commit 053141d31fe5aef1c255a1be183383860e0ccce9) |
| 0008 Refs 32690 Altered lookups Query rhs alterations dur.patch | (download) |
django/db/models/fields/related_lookups.py |
58 32 + 26 - 0 ! |
refs #32690 -- altered lookups query rhs alterations during initialization. Having it happen at the lookup creation time ensures entry points called before the compilation phase (e.g. get_group_by_cols) don't have to duplicate the logic in charge of altering Query instances used as rhs. It also has the nice effect of reducing the amount of time the alteration logic to once as opposed to multiple times if the queryset is compiled more than once. (cherry picked from commit e3bde71676a704e27d62e5f96dd967f7305db7f2) |
| 0009 Fixed 33282 Fixed a crash when OR ing subquery and a.patch | (download) |
django/db/models/expressions.py |
9 5 + 4 - 0 ! |
fixed #33282 -- fixed a crash when or'ing subquery and aggregation lookups. As a QuerySet resolves to Query the outer column references grouping logic should be defined on the latter and proxied from Subquery for the cases where get_group_by_cols is called on unresolved expressions. Thanks Antonio Terceiro for the report and initial patch. (cherry picked from commit e5a92d400acb4ca6a8e1375d1ab8121f2c7220be) |
| 0011 Moved RequestSite import to the toplevel.patch | (download) |
django/contrib/sites/shortcuts.py |
7 4 + 3 - 0 ! |
moved requestsite import to the toplevel. Via https://github.com/django/django/commit/78163d1ac4407d59bfc5fdf1f84f2dbbb2ed3443 |
| 0012 Add Python 3.11 support for tests.patch | (download) |
django/utils/version.py |
1 1 + 0 - 0 ! |
fix test_runner/test_utils tests on python 3.11+. |
| 0013 fix url validator.patch | (download) |
django/core/validators.py |
13 7 + 6 - 0 ! |
fixed urlvalidator crash in some edge cases |
| 0014 CVE 2024 39329.patch | (download) |
django/contrib/auth/hashers.py |
10 8 + 2 - 0 ! |
[patch] [4.2.x] fixed cve-2024-39329 -- standarized timing of verify_password() when checking unusuable passwords. Refs #20760. Thanks Michael Manfre for the fix and to Adam Johnson for the review. |
| 0015 CVE 2024 39330.patch | (download) |
django/core/files/storage.py |
11 11 + 0 - 0 ! |
[patch] [4.2.x] fixed cve-2024-39330 -- added extra file name validation in Storage's save method. Thanks to Josh Schneier for the report, and to Carlton Gibson and Sarah Boyce for the reviews. |
| 0016 CVE 2024 39614.patch | (download) |
django/utils/translation/trans_real.py |
23 18 + 5 - 0 ! |
[patch] [4.2.x] fixed cve-2024-39614 -- mitigated potential dos in get_supported_language_variant(). Language codes are now parsed with a maximum length limit of 500 chars. Thanks to MProgrammer for the report. |
| 0017 CVE 2024 41989.patch | (download) |
django/template/defaultfilters.py |
13 13 + 0 - 0 ! |
[patch] [4.2.x] fixed cve-2024-41989 -- prevented excessive memory consumption in floatformat. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Thanks Elias Myllymki for the report. Co-authored-by: Shai Berger <shai@platonix.com> |
| 0018 CVE 2024 41991.patch | (download) |
django/contrib/admin/widgets.py |
2 1 + 1 - 0 ! |
[patch] [4.2.x] fixed cve-2024-41991 -- prevented potential redos in django.utils.html.urlize() and AdminURLFieldWidget. Thanks Seokchan Yoon for the report. Co-authored-by: Sarah Boyce <42296566+sarahboyce@users.noreply.github.com> |
| 0019 CVE 2024 42005.patch | (download) |
django/db/models/sql/query.py |
2 2 + 0 - 0 ! |
[patch] [4.2.x] fixed cve-2024-42005 -- mitigated queryset.values() SQL injection attacks against JSON fields. Thanks Eyal (eyalgabay) for the report. |
| 0020 CVE 2024 45231.patch | (download) |
django/contrib/auth/forms.py |
9 8 + 1 - 0 ! |
[patch] [4.2.x] fixed cve-2024-45231 -- avoided server error on password reset when email sending fails. On successful submission of a password reset request, an email is sent to the accounts known to the system. If sending this email fails (due to email backend misconfiguration, service provider outage, network issues, etc.), an attacker might exploit this by detecting which password reset requests succeed and which ones generate a 500 error response. Thanks to Thibaut Spriet for the report, and to Mariusz Felisiak, Adam Johnson, and Sarah Boyce for the reviews. |
| 0021 CVE 2024 53907.patch | (download) |
django/utils/html.py |
10 8 + 2 - 0 ! |
[patch] [4.2.x] fixed cve-2024-53907 -- mitigated potential dos in strip_tags(). Thanks to jiangniao for the report, and Shai Berger and Natalia Bidart for the reviews. |
| 0022 CVE 2024 56374.patch | (download) |
django/db/models/fields/__init__.py |
6 3 + 3 - 0 ! |
[patch] [4.2.x] fixed cve-2024-56374 -- mitigated potential dos in IPv6 validation. Thanks Saravana Kumar for the report, and Sarah Boyce and Mariusz Felisiak for the reviews. Co-authored-by: Natalia <124304+nessita@users.noreply.github.com> |
| 0023 CVE 2025 13372.patch | (download) |
django/db/backends/postgresql/compiler.py |
24 24 + 0 - 0 ! |
[patch] [4.2.x] fixed cve-2025-13372 -- protected filteredrelation against SQL injection in column aliases on PostgreSQL. Follow-up to CVE-2025-57833. Thanks Stackered for the report, and Simon Charette and Mariusz Felisiak for the reviews. Backport of 5b90ca1e7591fa36fccf2d6dad67cf1477e6293e from main. |
| 0024 CVE 2025 26699.patch | (download) |
django/utils/text.py |
27 10 + 17 - 0 ! |
[patch] [4.2.x] fixed cve-2025-26699 -- mitigated potential dos in wordwrap template filter. Thanks sw0rd1ight for the report. Backport of 55d89e25f4115c5674cdd9b9bcba2bb2bb6d820b from main. |
| 0025 CVE 2025 32873.patch | (download) |
django/utils/html.py |
6 6 + 0 - 0 ! |
[patch] [4.2.x] fixed cve-2025-32873 -- mitigated potential dos in strip_tags(). MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Thanks to Elias Myllymki for the report, and Shai Berger and Jake Howard for the reviews. Co-authored-by: Natalia <124304+nessita@users.noreply.github.com> Backport of 9f3419b519799d69f2aba70b9d25abe2e70d03e0 from main. |
| 0026 CVE 2025 48432.patch | (download) |
django/utils/log.py |
7 6 + 1 - 0 ! |
[patch] [4.2.x] fixed cve-2025-48432 -- escaped formatting arguments in `log_response()`. Suitably crafted requests containing a CRLF sequence in the request path may have allowed log injection, potentially corrupting log files, obscuring other attacks, misleading log post-processing tools, or forging log entries. To mitigate this, all positional formatting arguments passed to the logger are now escaped using "unicode_escape" encoding. Thanks to Seokchan Yoon (https://ch4n3.kr/) for the report. Co-authored-by: Carlton Gibson <carlton@noumenal.es> Co-authored-by: Jake Howard <git@theorangeone.net> Backport of a07ebec5591e233d8bbb38b7d63f35c5479eef0e from main. |
| 0027 CVE 2025 48432 2.patch | (download) |
django/views/generic/base.py |
17 9 + 8 - 0 ! |
[patch] [4.2.x] refs cve-2025-48432 -- prevented log injection in remaining response logging. Migrated remaining response-related logging to use the `log_response()` helper to avoid potential log injection, to ensure untrusted values like request paths are safely escaped. Co-authored-by: Natalia <124304+nessita@users.noreply.github.com> Backport of 957951755259b412d5113333b32bf85871d29814 from main. |
| 0028 CVE 2025 57833.patch | (download) |
django/db/models/sql/query.py |
1 1 + 0 - 0 ! |
[patch] [4.2.x] fixed cve-2025-57833 -- protected filteredrelation against SQL injection in column aliases. Thanks Eyal Gabay (EyalSec) for the report. Backport of 51711717098d3f469f795dfa6bc3758b24f69ef7 from main. |
| 0029 CVE 2025 59681.patch | (download) |
django/db/models/sql/query.py |
8 4 + 4 - 0 ! |
[patch] [4.2.x] fixed cve-2025-59681 -- protected QuerySet.annotate(), alias(), aggregate(), and extra() against SQL injection in column aliases on MySQL/MariaDB. Thanks sw0rd1ight for the report. Follow up to 93cae5cb2f9a4ef1514cf1a41f714fef08005200. Backport of 41b43c74bda19753c757036673ea9db74acf494a from main. |
| 0030 CVE 2025 59682.patch | (download) |
django/utils/archive.py |
6 5 + 1 - 0 ! |
[patch] [4.2.x] fixed cve-2025-59682 -- fixed potential partial directory-traversal via archive.extract(). Thanks stackered for the report. Follow up to 05413afa8c18cdb978fcdf470e09f7a12b234a23. Backport of 924a0c092e65fa2d0953fd1855d2dc8786d94de2 from main. |
| 0031 CVE 2025 64459.patch | (download) |
django/db/models/query_utils.py |
4 4 + 0 - 0 ! |
[patch] [4.2.x] fixed cve-2025-64459 -- prevented sql injections in Q/QuerySet via the _connector kwarg. Thanks cyberstan for the report, Sarah Boyce, Adam Johnson, Simon Charette, and Jake Howard for the reviews. Backport of c880530ddd4fabd5939bab0e148bebe36699432a from main. |
| 0032 CVE 2025 64460.patch | (download) |
django/core/serializers/xml_serializer.py |
38 32 + 6 - 0 ! |
[patch] [4.2.x] fixed cve-2025-64460 -- corrected quadratic inner text accumulation in XML serializer. Previously, `getInnerText()` recursively used `list.extend()` on strings, which added each character from child nodes as a separate list element. On deeply nested XML content, this caused the overall deserialization work to grow quadratically with input size, potentially allowing disproportionate CPU consumption for crafted XML. The fix separates collection of inner texts from joining them, so that each subtree is joined only once, reducing the complexity to linear in the size of the input. These changes also include a mitigation for a xml.dom.minidom performance issue. Thanks Seokchan Yoon (https://ch4n3.kr/) for report. Co-authored-by: Jacob Walls <jacobtylerwalls@gmail.com> Co-authored-by: Natalia <124304+nessita@users.noreply.github.com> Backport of 50efb718b31333051bc2dcb06911b8fa1358c98c from main. |
