Debian Package Tracker
Register | Log in
Subscribe

python-django

Choose email to subscribe with

general
  • source: python-django (main)
  • version: 3:4.2.28-1
  • maintainer: Debian Python Team (DMD)
  • uploaders: Brian May [DMD] – Chris Lamb [DMD] – Raphaël Hertzog [DMD] – Luke Faraone [DMD]
  • arch: all
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2:2.2.28-1~deb11u2
  • o-o-sec: 2:2.2.28-1~deb11u12
  • oldstable: 3:3.2.19-1+deb12u1
  • old-sec: 3:3.2.25-0+deb12u1
  • old-bpo: 3:4.2.21-1~bpo12+1
  • old-p-u: 3:3.2.19-1+deb12u2
  • stable: 3:4.2.23-1
  • stable-sec: 3:4.2.27-0+deb13u1
  • stable-p-u: 3:4.2.27-0+deb13u1
  • testing: 3:4.2.28-1
  • unstable: 3:4.2.28-1
  • exp: 3:6.0.2-1
versioned links
  • 2:2.2.28-1~deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:2.2.28-1~deb11u12: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3:3.2.19-1+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3:3.2.19-1+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3:3.2.25-0+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3:4.2.21-1~bpo12+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3:4.2.23-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3:4.2.27-0+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3:4.2.28-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3:6.0~rc1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3:6.0.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • python-django-doc
  • python3-django (3 bugs: 0, 2, 1, 0)
action needed
Debci reports failed tests high
  • unstable: fail (log)
    The tests ran in 0:03:41
    Last run: 2026-02-06T14:24:56.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 0:02:12
    Last run: 2026-02-16T00:23:09.000Z
    Previous status: unknown

  • stable: pass (log)
    The tests ran in 0:02:02
    Last run: 2025-11-08T18:40:15.000Z
    Previous status: unknown

Created: 2026-02-06 Last update: 2026-02-21 17:31
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2022-08-03 Last update: 2026-02-20 01:01
6 security issues in trixie high

There are 6 open security issues in trixie.

6 important issues:
  • CVE-2026-1207: An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. Raster lookups on ``RasterField`` (only implemented on PostGIS) allows remote attackers to inject SQL via the band index parameter. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue.
  • CVE-2026-1285: An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
  • CVE-2026-1287: An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `FilteredRelation` is subject to SQL injection in column aliases via control characters, using a suitably crafted dictionary, with dictionary expansion, as the `**kwargs` passed to `QuerySet` methods `annotate()`, `aggregate()`, `extra()`, `values()`, `values_list()`, and `alias()`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Solomon Kebede for reporting this issue.
  • CVE-2026-1312: An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `.QuerySet.order_by()` is subject to SQL injection in column aliases containing periods when the same alias is, using a suitably crafted dictionary, with dictionary expansion, used in `FilteredRelation`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Solomon Kebede for reporting this issue.
  • CVE-2025-13473: An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.
  • CVE-2025-14550: An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Jiyong Yang for reporting this issue.
Created: 2026-02-03 Last update: 2026-02-19 23:30
10 security issues in bookworm high

There are 10 open security issues in bookworm.

7 important issues:
  • CVE-2026-1207: An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. Raster lookups on ``RasterField`` (only implemented on PostGIS) allows remote attackers to inject SQL via the band index parameter. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue.
  • CVE-2026-1285: An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
  • CVE-2026-1287: An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `FilteredRelation` is subject to SQL injection in column aliases via control characters, using a suitably crafted dictionary, with dictionary expansion, as the `**kwargs` passed to `QuerySet` methods `annotate()`, `aggregate()`, `extra()`, `values()`, `values_list()`, and `alias()`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Solomon Kebede for reporting this issue.
  • CVE-2026-1312: An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `.QuerySet.order_by()` is subject to SQL injection in column aliases containing periods when the same alias is, using a suitably crafted dictionary, with dictionary expansion, used in `FilteredRelation`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Solomon Kebede for reporting this issue.
  • CVE-2024-53908: An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. Direct usage of the django.db.models.fields.json.HasKey lookup, when an Oracle database is used, is subject to SQL injection if untrusted data is used as an lhs value. (Applications that use the jsonfield.has_key lookup via __ are unaffected.)
  • CVE-2025-13473: An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.
  • CVE-2025-14550: An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Jiyong Yang for reporting this issue.
3 issues left for the package maintainer to handle:
  • CVE-2024-38875: (needs triaging) An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urlizetrunc were subject to a potential denial of service attack via certain inputs with a very large number of brackets.
  • CVE-2024-41990: (needs triaging) An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
  • CVE-2024-45230: (needs triaging) An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-09-04 Last update: 2026-02-19 23:30
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2026-02-10 Last update: 2026-02-21 14:03
lintian reports 67 warnings normal
Lintian reports 67 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-02-06 Last update: 2026-02-06 04:01
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • python-django-doc could be marked Multi-Arch: foreign
Created: 2023-09-25 Last update: 2026-02-21 14:03
debian/patches: 6 patches to forward upstream low

Among the 9 debian patches available in version 3:4.2.28-1 of the package, we noticed the following issues:

  • 6 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-02-06 06:01
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2020-02-26 Last update: 2023-09-29 09:41
news
[rss feed]
  • [2026-02-19] Accepted python-django 2:2.2.28-1~deb11u12 (source) into oldoldstable-security (Chris Lamb)
  • [2026-02-15] Accepted python-django 3:3.2.25-0+deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Chris Lamb)
  • [2026-02-08] python-django 3:4.2.28-1 MIGRATED to testing (Debian testing watch)
  • [2026-02-05] Accepted python-django 3:6.0.2-1 (source) into experimental (Chris Lamb)
  • [2026-02-05] Accepted python-django 3:4.2.28-1 (source) into unstable (Chris Lamb)
  • [2026-01-31] Accepted python-django 3:4.2.27-0+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Chris Lamb)
  • [2026-01-31] Accepted python-django 3:4.2.27-0+deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Chris Lamb)
  • [2026-01-28] Accepted python-django 2:2.2.28-1~deb11u11 (source) into oldoldstable-security (Chris Lamb)
  • [2026-01-06] Accepted python-django 3:6.0.1-1 (source) into experimental (Chris Lamb)
  • [2025-12-29] Accepted python-django 2:2.2.28-1~deb11u10 (source) into oldoldstable-security (Chris Lamb)
  • [2025-12-20] python-django 3:4.2.27-2 MIGRATED to testing (Debian testing watch)
  • [2025-12-17] Accepted python-django 3:4.2.27-2 (source) into unstable (Colin Watson)
  • [2025-12-03] Accepted python-django 3:6.0-1 (source) into experimental (Chris Lamb)
  • [2025-12-02] Accepted python-django 3:4.2.27-1 (source) into unstable (Chris Lamb)
  • [2025-11-20] Accepted python-django 3:6.0~rc1-1 (source) into experimental (Chris Lamb)
  • [2025-11-12] python-django 3:4.2.26-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-05] Accepted python-django 3:4.2.26-1 (source) into unstable (Chris Lamb)
  • [2025-10-25] python-django 3:4.2.25-2 MIGRATED to testing (Debian testing watch)
  • [2025-10-23] Accepted python-django 3:6.0~beta1-1 (source) into experimental (Chris Lamb)
  • [2025-10-22] Accepted python-django 3:4.2.25-2 (source) into unstable (Colin Watson)
  • [2025-10-08] Accepted python-django 2:2.2.28-1~deb11u9 (source) into oldoldstable-security (Chris Lamb)
  • [2025-10-04] python-django 3:4.2.25-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-01] Accepted python-django 3:4.2.25-1 (source) into unstable (Chris Lamb)
  • [2025-09-18] Accepted python-django 3:6.0~alpha1-1 (source) into experimental (Chris Lamb)
  • [2025-09-15] Accepted python-django 2:2.2.28-1~deb11u8 (source) into oldoldstable-security (Chris Lamb)
  • [2025-09-14] python-django 3:4.2.24-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-03] Accepted python-django 3:4.2.24-1 (source) into unstable (Chris Lamb)
  • [2025-09-03] Accepted python-django 3:5.2.6-1 (source) into experimental (Chris Lamb)
  • [2025-08-06] Accepted python-django 3:5.2.5-1 (source) into experimental (Chris Lamb)
  • [2025-07-07] Accepted python-django 3:5.2.4-1 (source) into experimental (Chris Lamb)
  • 1
  • 2
bugs [bug history graph]
  • all: 7
  • RC: 1
  • I&N: 4
  • M&W: 1
  • F&P: 1
  • patch: 0
links
  • homepage
  • lintian (0, 67)
  • buildd: logs, exp, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 81)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3:5.2.9-0ubuntu3
  • 5 bugs (2 patches)
  • patches for 3:5.2.9-0ubuntu3

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing