Debian Package Tracker
Register | Log in
Subscribe

deepdiff

Deep Difference and search of any Python object/data

Choose email to subscribe with

general
  • source: deepdiff (main)
  • version: 8.6.1-1
  • maintainer: Debian Python Team (DMD)
  • uploaders: Michael Banck [DMD]
  • arch: all
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.3.0-2
  • oldstable: 6.2.2-1
  • stable: 8.1.1-4
  • testing: 8.6.1-1
  • unstable: 8.6.1-1
versioned links
  • 3.3.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.2.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.1.1-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.6.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • python3-deepdiff
action needed
Debci reports failed tests high
  • unstable: fail (log)
    The tests ran in 0:00:59
    Last run: 2025-12-10T04:14:30.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 0:01:10
    Last run: 2026-02-01T06:26:51.000Z
    Previous status: unknown

  • stable: pass (log)
    The tests ran in 0:00:49
    Last run: 2025-11-09T01:34:57.000Z
    Previous status: unknown

Created: 2025-12-10 Last update: 2026-03-22 19:00
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2025-58367: DeepDiff is a project focused on Deep Difference and search of any Python data. Versions 5.0.0 through 8.6.0 are vulnerable to class pollution via the Delta class constructor, and when combined with a gadget available in DeltaDiff, it can lead to Denial of Service and Remote Code Execution (via insecure Pickle deserialization) exploitation. The gadget available in DeepDiff allows `deepdiff.serialization.SAFE_TO_IMPORT` to be modified to allow dangerous classes such as posix.system, and then perform insecure Pickle deserialization via the Delta class. This potentially allows any Python code to be executed, given that the input to Delta is user-controlled. Depending on the application where DeepDiff is used, this can also lead to other vulnerabilities. This is fixed in version 8.6.1.
  • CVE-2026-33155: DeepDiff is a project focused on Deep Difference and search of any Python data. From version 5.0.0 to before version 8.6.2, the pickle unpickler _RestrictedUnpickler validates which classes can be loaded but does not limit their constructor arguments. A few of the types in SAFE_TO_IMPORT have constructors that allocate memory proportional to their input (builtins.bytes, builtins.list, builtins.range). A 40-byte pickle payload can force 10+ GB of memory, which crashes applications that load delta objects or call pickle_load with untrusted data. This issue has been patched in version 8.6.2.
Created: 2026-03-21 Last update: 2026-03-21 21:17
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-33155: DeepDiff is a project focused on Deep Difference and search of any Python data. From version 5.0.0 to before version 8.6.2, the pickle unpickler _RestrictedUnpickler validates which classes can be loaded but does not limit their constructor arguments. A few of the types in SAFE_TO_IMPORT have constructors that allocate memory proportional to their input (builtins.bytes, builtins.list, builtins.range). A 40-byte pickle payload can force 10+ GB of memory, which crashes applications that load delta objects or call pickle_load with untrusted data. This issue has been patched in version 8.6.2.
Created: 2026-03-21 Last update: 2026-03-21 21:17
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-33155: DeepDiff is a project focused on Deep Difference and search of any Python data. From version 5.0.0 to before version 8.6.2, the pickle unpickler _RestrictedUnpickler validates which classes can be loaded but does not limit their constructor arguments. A few of the types in SAFE_TO_IMPORT have constructors that allocate memory proportional to their input (builtins.bytes, builtins.list, builtins.range). A 40-byte pickle payload can force 10+ GB of memory, which crashes applications that load delta objects or call pickle_load with untrusted data. This issue has been patched in version 8.6.2.
Created: 2026-03-21 Last update: 2026-03-21 21:17
2 security issues in bullseye high

There are 2 open security issues in bullseye.

2 important issues:
  • CVE-2025-58367: DeepDiff is a project focused on Deep Difference and search of any Python data. Versions 5.0.0 through 8.6.0 are vulnerable to class pollution via the Delta class constructor, and when combined with a gadget available in DeltaDiff, it can lead to Denial of Service and Remote Code Execution (via insecure Pickle deserialization) exploitation. The gadget available in DeepDiff allows `deepdiff.serialization.SAFE_TO_IMPORT` to be modified to allow dangerous classes such as posix.system, and then perform insecure Pickle deserialization via the Delta class. This potentially allows any Python code to be executed, given that the input to Delta is user-controlled. Depending on the application where DeepDiff is used, this can also lead to other vulnerabilities. This is fixed in version 8.6.1.
  • CVE-2026-33155: DeepDiff is a project focused on Deep Difference and search of any Python data. From version 5.0.0 to before version 8.6.2, the pickle unpickler _RestrictedUnpickler validates which classes can be loaded but does not limit their constructor arguments. A few of the types in SAFE_TO_IMPORT have constructors that allocate memory proportional to their input (builtins.bytes, builtins.list, builtins.range). A 40-byte pickle payload can force 10+ GB of memory, which crashes applications that load delta objects or call pickle_load with untrusted data. This issue has been patched in version 8.6.2.
Created: 2026-03-21 Last update: 2026-03-21 21:17
2 security issues in bookworm high

There are 2 open security issues in bookworm.

2 important issues:
  • CVE-2025-58367: DeepDiff is a project focused on Deep Difference and search of any Python data. Versions 5.0.0 through 8.6.0 are vulnerable to class pollution via the Delta class constructor, and when combined with a gadget available in DeltaDiff, it can lead to Denial of Service and Remote Code Execution (via insecure Pickle deserialization) exploitation. The gadget available in DeepDiff allows `deepdiff.serialization.SAFE_TO_IMPORT` to be modified to allow dangerous classes such as posix.system, and then perform insecure Pickle deserialization via the Delta class. This potentially allows any Python code to be executed, given that the input to Delta is user-controlled. Depending on the application where DeepDiff is used, this can also lead to other vulnerabilities. This is fixed in version 8.6.1.
  • CVE-2026-33155: DeepDiff is a project focused on Deep Difference and search of any Python data. From version 5.0.0 to before version 8.6.2, the pickle unpickler _RestrictedUnpickler validates which classes can be loaded but does not limit their constructor arguments. A few of the types in SAFE_TO_IMPORT have constructors that allocate memory proportional to their input (builtins.bytes, builtins.list, builtins.range). A 40-byte pickle payload can force 10+ GB of memory, which crashes applications that load delta objects or call pickle_load with untrusted data. This issue has been patched in version 8.6.2.
Created: 2026-03-21 Last update: 2026-03-21 21:17
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2025-05-15 Last update: 2025-05-15 04:02
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.2).
Created: 2025-12-23 Last update: 2025-12-23 20:00
news
[rss feed]
  • [2025-12-25] deepdiff 8.6.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-12-22] Accepted deepdiff 8.6.1-1 (source) into unstable (Colin Watson)
  • [2025-06-04] deepdiff 8.1.1-4 MIGRATED to testing (Debian testing watch)
  • [2025-05-14] Accepted deepdiff 8.1.1-4 (source) into unstable (Alexandre Detiste)
  • [2025-02-20] deepdiff 8.1.1-3 MIGRATED to testing (Debian testing watch)
  • [2025-02-17] Accepted deepdiff 8.1.1-3 (source) into unstable (Alexandre Detiste)
  • [2025-02-07] deepdiff 8.1.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-02-01] Accepted deepdiff 8.1.1-2 (source) into unstable (Alexandre Detiste)
  • [2024-12-22] deepdiff 8.1.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-19] Accepted deepdiff 8.1.1-1 (source) into unstable (Emmanuel Arias)
  • [2024-04-01] deepdiff 6.7.1-2 MIGRATED to testing (Debian testing watch)
  • [2024-04-01] deepdiff 6.7.1-2 MIGRATED to testing (Debian testing watch)
  • [2024-03-28] Accepted deepdiff 6.7.1-2 (source) into unstable (Alexandre Detiste)
  • [2024-01-14] deepdiff 6.7.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-01-11] Accepted deepdiff 6.7.1-1 (source) into unstable (Andreas Tille)
  • [2022-12-15] deepdiff 6.2.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-12] Accepted deepdiff 6.2.2-1 (source) into unstable (Louis-Philippe Véronneau)
  • [2022-08-26] deepdiff 5.8.2-3 MIGRATED to testing (Debian testing watch)
  • [2022-08-14] deepdiff REMOVED from testing (Debian testing watch)
  • [2022-07-09] deepdiff 5.8.2-3 MIGRATED to testing (Debian testing watch)
  • [2022-07-07] Accepted deepdiff 5.8.2-3 (source) into unstable (Sandro Tosi)
  • [2022-06-30] deepdiff 5.8.2-2 MIGRATED to testing (Debian testing watch)
  • [2022-06-28] Accepted deepdiff 5.8.2-2 (source) into unstable (Sandro Tosi)
  • [2022-06-19] deepdiff 5.8.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-06-15] Accepted deepdiff 5.8.2-1 (source) into unstable (Louis-Philippe Véronneau)
  • [2022-04-14] deepdiff 5.6.0-2 MIGRATED to testing (Debian testing watch)
  • [2022-04-11] Accepted deepdiff 5.6.0-2 (source) into unstable (Louis-Philippe Véronneau)
  • [2022-01-30] Accepted deepdiff 5.6.0-1 (source) into unstable (Louis-Philippe Véronneau)
  • [2021-12-30] deepdiff 3.3.0-3 MIGRATED to testing (Debian testing watch)
  • [2021-12-24] Accepted deepdiff 3.3.0-3 (source) into unstable (Michael Banck)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 8.6.1-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing