Debian Package Tracker
Register | Log in
Subscribe

django-allauth

Choose email to subscribe with

general
  • source: django-allauth (main)
  • version: 65.0.2-2
  • maintainer: Debian Python Team (DMD)
  • uploaders: Jonas Meurer [DMD] – Pierre-Elliott Bécue [DMD]
  • arch: all
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.44.0+ds-1+deb11u1
  • oldstable: 0.51.0-1
  • stable: 65.0.2-1
  • testing: 65.0.2-1
  • unstable: 65.0.2-2
versioned links
  • 0.44.0+ds-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.51.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 65.0.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 65.0.2-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • python-django-allauth-doc
  • python3-django-allauth (1 bugs: 0, 1, 0, 0)
action needed
Marked for autoremoval on 10 February: #1124154 high
Version 65.0.2-1 of django-allauth is marked for autoremoval from testing on Tue 10 Feb 2026. It is affected by #1124154. The removal of django-allauth will also cause the removal of (transitive) reverse dependencies: django-invitations, django-mailman3, hyperkitty, mailman-hyperkitty, mailman-suite, mailman3, postorius. You should try to prevent the removal by fixing these RC bugs.
Created: 2026-01-04 Last update: 2026-01-10 00:02
A new upstream version is available: 65.13.1 high
A new upstream version 65.13.1 is available, you should consider packaging it.
Created: 2025-11-27 Last update: 2026-01-10 00:02
2 security issues in trixie high

There are 2 open security issues in trixie.

1 important issue:
  • CVE-2025-65430: An issue was discovered in allauth-django before 65.13.0. IdP: marking a user as is_active=False after having handed tokens for that user while the account was still active had no effect. Fixed the access/refresh tokens are now rejected.
1 issue left for the package maintainer to handle:
  • CVE-2025-65431: (needs triaging) An issue was discovered in allauth-django before 65.13.0. Both Okta and NetIQ were using preferred_username as the identifier for third-party provider accounts. That value may be mutable and should therefore be avoided for authorization decisions. The providers are now using sub instead.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-12-15 Last update: 2026-01-08 12:17
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2025-65430: An issue was discovered in allauth-django before 65.13.0. IdP: marking a user as is_active=False after having handed tokens for that user while the account was still active had no effect. Fixed the access/refresh tokens are now rejected.
  • CVE-2025-65431: An issue was discovered in allauth-django before 65.13.0. Both Okta and NetIQ were using preferred_username as the identifier for third-party provider accounts. That value may be mutable and should therefore be avoided for authorization decisions. The providers are now using sub instead.
Created: 2025-12-15 Last update: 2026-01-08 12:17
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2025-65430: An issue was discovered in allauth-django before 65.13.0. IdP: marking a user as is_active=False after having handed tokens for that user while the account was still active had no effect. Fixed the access/refresh tokens are now rejected.
  • CVE-2025-65431: An issue was discovered in allauth-django before 65.13.0. Both Okta and NetIQ were using preferred_username as the identifier for third-party provider accounts. That value may be mutable and should therefore be avoided for authorization decisions. The providers are now using sub instead.
Created: 2025-12-15 Last update: 2026-01-08 12:17
2 security issues in bullseye high

There are 2 open security issues in bullseye.

1 important issue:
  • CVE-2025-65430: An issue was discovered in allauth-django before 65.13.0. IdP: marking a user as is_active=False after having handed tokens for that user while the account was still active had no effect. Fixed the access/refresh tokens are now rejected.
1 issue postponed or untriaged:
  • CVE-2025-65431: (postponed; to be fixed through a stable update) An issue was discovered in allauth-django before 65.13.0. Both Okta and NetIQ were using preferred_username as the identifier for third-party provider accounts. That value may be mutable and should therefore be avoided for authorization decisions. The providers are now using sub instead.
Created: 2025-12-15 Last update: 2026-01-08 12:17
2 security issues in bookworm high

There are 2 open security issues in bookworm.

1 important issue:
  • CVE-2025-65430: An issue was discovered in allauth-django before 65.13.0. IdP: marking a user as is_active=False after having handed tokens for that user while the account was still active had no effect. Fixed the access/refresh tokens are now rejected.
1 issue left for the package maintainer to handle:
  • CVE-2025-65431: (needs triaging) An issue was discovered in allauth-django before 65.13.0. Both Okta and NetIQ were using preferred_username as the identifier for third-party provider accounts. That value may be mutable and should therefore be avoided for authorization decisions. The providers are now using sub instead.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-12-15 Last update: 2026-01-08 12:17
debian/patches: 1 patch to forward upstream low

Among the 4 debian patches available in version 65.0.2-2 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2026-01-08 Last update: 2026-01-08 13:01
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2025-04-24 Last update: 2025-04-24 03:31
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.0).
Created: 2025-02-21 Last update: 2026-01-08 12:30
testing migrations
  • excuses:
    • Migration status for django-allauth (65.0.2-1 to 65.0.2-2): Will attempt migration (Any information below is purely informational)
    • Additional info (not blocking):
    • ∙ ∙ Updating django-allauth will fix bugs in testing: #1124154
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/d/django-allauth.html
    • ∙ ∙ Autopkgtest for django-allauth/65.0.2-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Reproducible on amd64 - info ♻
    • ∙ ∙ Reproducible on arm64 - info ♻
    • ∙ ∙ Required age reduced by 3 days because of autopkgtest
    • ∙ ∙ 2 days old (needed 2 days)
news
[rss feed]
  • [2026-01-08] Accepted django-allauth 65.0.2-2 (source) into unstable (Colin Watson)
  • [2024-10-24] django-allauth 65.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-20] Accepted django-allauth 65.0.2-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2024-08-21] Accepted django-allauth 64.1.0-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2024-01-13] django-allauth 0.58.2-2 MIGRATED to testing (Debian testing watch)
  • [2023-11-13] Accepted django-allauth 0.58.2-2 (source) into unstable (Pierre-Elliott Bécue)
  • [2022-10-17] django-allauth 0.51.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-15] Accepted django-allauth 0.51.0-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2022-03-05] Accepted django-allauth 0.44.0+ds-1+deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Pierre-Elliott Bécue)
  • [2022-01-22] django-allauth 0.47.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-01-20] Accepted django-allauth 0.47.0-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2021-12-02] django-allauth 0.46.0+ds-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-29] Accepted django-allauth 0.46.0+ds-1 (source) into unstable (Antonio Terceiro)
  • [2021-01-20] django-allauth 0.44.0+ds-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-18] Accepted django-allauth 0.44.0+ds-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2020-05-28] django-allauth 0.42.0+ds-1 MIGRATED to testing (Debian testing watch)
  • [2020-05-26] Accepted django-allauth 0.42.0+ds-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2020-01-06] django-allauth 0.41.0+ds-1 MIGRATED to testing (Debian testing watch)
  • [2019-12-25] Accepted django-allauth 0.41.0+ds-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2019-10-29] django-allauth 0.40.0+ds-2 MIGRATED to testing (Debian testing watch)
  • [2019-10-27] Accepted django-allauth 0.40.0+ds-2 (source) into unstable (Pierre-Elliott Bécue)
  • [2019-10-26] Accepted django-allauth 0.40.0+ds-1 (source all) into unstable (Pierre-Elliott Bécue)
  • [2019-08-05] django-allauth 0.39.1+ds-1 MIGRATED to testing (Debian testing watch)
  • [2019-08-02] Accepted django-allauth 0.39.1+ds-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2019-07-26] django-allauth 0.38.0+ds-2 MIGRATED to testing (Debian testing watch)
  • [2019-07-23] Accepted django-allauth 0.38.0+ds-2 (source) into unstable (Emmanuel Arias) (signed by: Thomas Goirand)
  • [2019-01-21] Accepted django-allauth 0.38.0+ds-1~bpo9+1 (source all) into stretch-backports (Pierre-Elliott Bécue)
  • [2018-10-29] django-allauth 0.38.0+ds-1 MIGRATED to testing (Debian testing watch)
  • [2018-10-26] Accepted django-allauth 0.38.0+ds-1 (source all) into unstable (Pierre-Elliott Bécue)
  • [2018-08-20] Accepted django-allauth 0.36.0+ds-1~bpo9+1 (source all) into stretch-backports (Pierre-Elliott Bécue)
  • 1
  • 2
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (-, 64)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 65.0.2-2

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing