Debian Package Tracker
Register | Log in
Subscribe

django-allauth

Choose email to subscribe with

general
  • source: django-allauth (main)
  • version: 65.15.0-1
  • maintainer: Debian Python Team (DMD)
  • uploaders: Jonas Meurer [DMD] – Pierre-Elliott Bécue [DMD]
  • arch: all
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.44.0+ds-1+deb11u1
  • oldstable: 0.51.0-1
  • stable: 65.0.2-1
  • testing: 65.15.0-1
  • unstable: 65.15.0-1
versioned links
  • 0.44.0+ds-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.51.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 65.0.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 65.15.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • python-django-allauth-doc
  • python3-django-allauth (1 bugs: 0, 1, 0, 0)
action needed
Marked for autoremoval on 05 May due to python-orjson: #1131588 high
Version 65.15.0-1 of django-allauth is marked for autoremoval from testing on Tue 05 May 2026. It depends (transitively) on python-orjson, affected by #1131588. You should try to prevent the removal by fixing these RC bugs.
Created: 2026-03-29 Last update: 2026-03-30 11:01
3 low-priority security issues in trixie low

There are 3 open security issues in trixie.

3 issues left for the package maintainer to handle:
  • CVE-2025-65430: (needs triaging) An issue was discovered in allauth-django before 65.13.0. IdP: marking a user as is_active=False after having handed tokens for that user while the account was still active had no effect. Fixed the access/refresh tokens are now rejected.
  • CVE-2025-65431: (needs triaging) An issue was discovered in allauth-django before 65.13.0. Both Okta and NetIQ were using preferred_username as the identifier for third-party provider accounts. That value may be mutable and should therefore be avoided for authorization decisions. The providers are now using sub instead.
  • CVE-2026-27982: (needs triaging) An open redirect vulnerability exists in django-allauth versions prior to 65.14.1 when SAML IdP initiated SSO is enabled (it is disabled by default), which may allow an attacker to redirect users to an arbitrary external website via a crafted URL.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-12-15 Last update: 2026-03-29 01:00
3 low-priority security issues in bookworm low

There are 3 open security issues in bookworm.

3 issues left for the package maintainer to handle:
  • CVE-2025-65430: (needs triaging) An issue was discovered in allauth-django before 65.13.0. IdP: marking a user as is_active=False after having handed tokens for that user while the account was still active had no effect. Fixed the access/refresh tokens are now rejected.
  • CVE-2025-65431: (needs triaging) An issue was discovered in allauth-django before 65.13.0. Both Okta and NetIQ were using preferred_username as the identifier for third-party provider accounts. That value may be mutable and should therefore be avoided for authorization decisions. The providers are now using sub instead.
  • CVE-2026-27982: (needs triaging) An open redirect vulnerability exists in django-allauth versions prior to 65.14.1 when SAML IdP initiated SSO is enabled (it is disabled by default), which may allow an attacker to redirect users to an arbitrary external website via a crafted URL.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-12-15 Last update: 2026-03-29 01:00
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2025-04-24 Last update: 2026-03-20 09:32
news
[rss feed]
  • [2026-03-24] django-allauth 65.15.0-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-19] Accepted django-allauth 65.15.0-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2026-01-10] django-allauth 65.0.2-2 MIGRATED to testing (Debian testing watch)
  • [2026-01-08] Accepted django-allauth 65.0.2-2 (source) into unstable (Colin Watson)
  • [2024-10-24] django-allauth 65.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-20] Accepted django-allauth 65.0.2-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2024-08-21] Accepted django-allauth 64.1.0-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2024-01-13] django-allauth 0.58.2-2 MIGRATED to testing (Debian testing watch)
  • [2023-11-13] Accepted django-allauth 0.58.2-2 (source) into unstable (Pierre-Elliott Bécue)
  • [2022-10-17] django-allauth 0.51.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-15] Accepted django-allauth 0.51.0-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2022-03-05] Accepted django-allauth 0.44.0+ds-1+deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Pierre-Elliott Bécue)
  • [2022-01-22] django-allauth 0.47.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-01-20] Accepted django-allauth 0.47.0-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2021-12-02] django-allauth 0.46.0+ds-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-29] Accepted django-allauth 0.46.0+ds-1 (source) into unstable (Antonio Terceiro)
  • [2021-01-20] django-allauth 0.44.0+ds-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-18] Accepted django-allauth 0.44.0+ds-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2020-05-28] django-allauth 0.42.0+ds-1 MIGRATED to testing (Debian testing watch)
  • [2020-05-26] Accepted django-allauth 0.42.0+ds-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2020-01-06] django-allauth 0.41.0+ds-1 MIGRATED to testing (Debian testing watch)
  • [2019-12-25] Accepted django-allauth 0.41.0+ds-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2019-10-29] django-allauth 0.40.0+ds-2 MIGRATED to testing (Debian testing watch)
  • [2019-10-27] Accepted django-allauth 0.40.0+ds-2 (source) into unstable (Pierre-Elliott Bécue)
  • [2019-10-26] Accepted django-allauth 0.40.0+ds-1 (source all) into unstable (Pierre-Elliott Bécue)
  • [2019-08-05] django-allauth 0.39.1+ds-1 MIGRATED to testing (Debian testing watch)
  • [2019-08-02] Accepted django-allauth 0.39.1+ds-1 (source) into unstable (Pierre-Elliott Bécue)
  • [2019-07-26] django-allauth 0.38.0+ds-2 MIGRATED to testing (Debian testing watch)
  • [2019-07-23] Accepted django-allauth 0.38.0+ds-2 (source) into unstable (Emmanuel Arias) (signed by: Thomas Goirand)
  • [2019-01-21] Accepted django-allauth 0.38.0+ds-1~bpo9+1 (source all) into stretch-backports (Pierre-Elliott Bécue)
  • 1
  • 2
bugs [bug history graph]
  • all: 3
  • RC: 0
  • I&N: 3
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (-, 97)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 65.0.2-2

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing