Debian Package Tracker
Register | Log in
Subscribe

python-django

Choose email to subscribe with

general
  • source: python-django (main)
  • version: 3:3.2.15-1
  • maintainer: Debian Python Team (DMD)
  • uploaders: Brian May [DMD] – Raphaël Hertzog [DMD] – Chris Lamb [DMD] – Luke Faraone [DMD]
  • arch: all
  • std-ver: 4.6.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:1.10.7-2+deb9u9
  • o-o-sec: 1:1.10.7-2+deb9u17
  • o-o-bpo: 1:1.11.20-1~bpo9+1
  • oldstable: 1:1.11.29-1~deb10u1
  • old-sec: 1:1.11.29-1~deb10u1
  • old-bpo: 2:2.2.24-1~bpo10+1
  • stable: 2:2.2.26-1~deb11u1
  • stable-bpo: 2:3.2.12-1~bpo11+1
  • testing: 3:3.2.15-1
  • unstable: 3:3.2.15-1
  • exp: 3:4.1-1
versioned links
  • 1:1.10.7-2+deb9u9: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.10.7-2+deb9u17: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.11.20-1~bpo9+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.11.29-1~deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:2.2.24-1~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:2.2.26-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:3.2.12-1~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3:3.2.15-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3:4.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • python-django-doc
  • python3-django (2 bugs: 0, 2, 0, 0)
action needed
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2022-08-03 Last update: 2022-08-16 18:21
13 security issues in buster high

There are 13 open security issues in buster.

3 important issues:
  • CVE-2022-28346: An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.
  • CVE-2022-28347: A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.
  • CVE-2022-34265: An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
10 issues postponed or untriaged:
  • CVE-2021-28658: (needs triaging) In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.
  • CVE-2021-31542: (needs triaging) In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.
  • CVE-2021-33203: (needs triaging) Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.
  • CVE-2021-33571: (needs triaging) In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
  • CVE-2021-44420: (needs triaging) In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
  • CVE-2021-45115: (postponed; to be fixed through a stable update) An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.
  • CVE-2021-45116: (postponed; to be fixed through a stable update) An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.
  • CVE-2021-45452: (postponed; to be fixed through a stable update) Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.
  • CVE-2022-22818: (needs triaging) The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.
  • CVE-2022-23833: (needs triaging) An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.
4 issues that should be fixed with the next stable update:
  • CVE-2021-3281: In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
  • CVE-2020-24583: An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.
  • CVE-2020-24584: An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.
  • CVE-2021-23336: The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
Created: 2022-07-04 Last update: 2022-08-06 09:01
6 security issues in bullseye high

There are 6 open security issues in bullseye.

4 important issues:
  • CVE-2022-28346: An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.
  • CVE-2022-28347: A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.
  • CVE-2022-34265: An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
  • CVE-2022-36359: An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.
2 issues left for the package maintainer to handle:
  • CVE-2022-22818: (needs triaging) The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.
  • CVE-2022-23833: (needs triaging) An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-07-04 Last update: 2022-08-06 09:01
lintian reports 63 errors and 4 warnings high
Lintian reports 63 errors and 4 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-08-04 Last update: 2022-08-04 04:33
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2021-06-09 Last update: 2022-08-18 10:22
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2020-02-26 Last update: 2022-08-04 04:13
news
[rss feed]
  • [2022-08-06] python-django 3:3.2.15-1 MIGRATED to testing (Debian testing watch)
  • [2022-08-03] Accepted python-django 3:4.1-1 (source) into experimental (Chris Lamb)
  • [2022-08-03] Accepted python-django 3:3.2.15-1 (source) into unstable (Chris Lamb)
  • [2022-08-02] Accepted python-django 3:3.2.14-1 (source) into unstable (Chris Lamb)
  • [2022-08-01] Accepted python-django 2:4.1~rc1-1 (source) into experimental (Chris Lamb)
  • [2022-07-05] Accepted python-django 2:4.0.6-1 (source) into unstable (Chris Lamb)
  • [2022-06-21] Accepted python-django 2:4.1~beta1-1 (source) into experimental (Chris Lamb)
  • [2022-06-16] Accepted python-django 2:4.0.5-2 (source) into unstable (Chris Lamb)
  • [2022-06-06] Accepted python-django 2:4.0.5-1 (source) into unstable (Chris Lamb)
  • [2022-05-26] Accepted python-django 1:1.10.7-2+deb9u17 (source) into oldoldstable (Chris Lamb)
  • [2022-05-18] Accepted python-django 2:4.1~alpha1-1 (source) into experimental (Chris Lamb)
  • [2022-04-16] python-django 2:3.2.13-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-14] Accepted python-django 1:1.10.7-2+deb9u16 (source all) into oldoldstable (Chris Lamb)
  • [2022-04-12] Accepted python-django 2:3.2.13-1 (source) into unstable (Chris Lamb)
  • [2022-04-12] Accepted python-django 2:4.0.4-1 (source) into experimental (Chris Lamb)
  • [2022-03-05] Accepted python-django 2:2.2.26-1~deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Chris Lamb)
  • [2022-03-02] Accepted python-django 2:4.0.3-1 (source) into experimental (Chris Lamb)
  • [2022-02-24] python-django 2:3.2.12-2 MIGRATED to testing (Debian testing watch)
  • [2022-02-22] Accepted python-django 2:3.2.12-2 (source) into unstable (Chris Lamb)
  • [2022-02-18] Accepted python-django 2:3.2.12-1~bpo11+1 (source all) into bullseye-backports (Chris Lamb)
  • [2022-02-18] python-django 2:3.2.12-1 MIGRATED to testing (Debian testing watch)
  • [2022-02-01] Accepted python-django 1:1.10.7-2+deb9u15 (source all) into oldoldstable (Chris Lamb)
  • [2022-02-01] Accepted python-django 2:3.2.12-1 (source) into unstable (Chris Lamb)
  • [2022-02-01] Accepted python-django 2:4.0.2-1 (source) into experimental (Chris Lamb)
  • [2022-01-28] Accepted python-django 2:4.0.1-2 (source) into experimental (Chris Lamb)
  • [2022-01-28] Accepted python-django 2:3.2.11-2 (source) into unstable (Chris Lamb)
  • [2022-01-12] Accepted python-django 2:3.2.10-2~bpo11+2 (source all) into bullseye-backports (Chris Lamb)
  • [2022-01-04] Accepted python-django 2:3.2.11-1 (source) into unstable (Chris Lamb)
  • [2022-01-04] Accepted python-django 2:4.0.1-1 (source) into experimental (Chris Lamb)
  • [2021-12-18] Accepted python-django 2:3.2.10-2~bpo11+1 (source all) into bullseye-backports (Chris Lamb)
  • 1
  • 2
bugs [bug history graph]
  • all: 3
  • RC: 1
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (63, 4)
  • buildd: logs, exp, clang, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 79)
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3:3.2.15-1
  • 5 bugs (2 patches)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing