UbuntuUpdates.org

Package "python-django"

Name: python-django

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • High-level Python web development framework (documentation)
  • High-level Python web development framework

Latest version: 3:4.2.11-1ubuntu1.14
Release: noble (24.04)
Level: updates
Repository: main

Links



Other versions of "python-django" in Noble

Repository Area Version
base main 3:4.2.11-1ubuntu1
security main 3:4.2.11-1ubuntu1.14

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3:4.2.11-1ubuntu1.14 2026-02-03 20:07:52 UTC

  python-django (3:4.2.11-1ubuntu1.14) noble-security; urgency=medium

  * SECURITY UPDATE: Username enumeration through timing difference in
    mod_wsgi authentication handler
    - debian/patches/CVE-2025-13473.patch: standardize timing of
      check_password() in mod_wsgi auth handler in
      django/contrib/auth/handlers/modwsgi.py,
      tests/auth_tests/test_handlers.py.
    - CVE-2025-13473
  * SECURITY UPDATE: Potential denial-of-service vulnerability via repeated
    headers when using ASGI
    - debian/patches/CVE-2025-14550.patch: optimize repeated header parsing
      in ASGI requests in django/core/handlers/asgi.py,
      tests/asgi/tests.py.
    - CVE-2025-14550
  * SECURITY UPDATE: Potential SQL injection via raster lookups on PostGIS
    - debian/patches/CVE-2026-1207.patch: prevent SQL injections in
      RasterField lookups via band index in
      django/contrib/gis/db/backends/postgis/operations.py,
      tests/gis_tests/rasterapp/test_rasterfield.py.
    - CVE-2026-1207
  * SECURITY UPDATE: Potential denial-of-service vulnerability in
    django.utils.text.Truncator HTML methods
    - debian/patches/CVE-2026-1285.patch: mitigate potential DoS in
      django.utils.text.Truncator for HTML input in django/utils/text.py,
      tests/utils_tests/test_text.py.
    - CVE-2026-1285
  * SECURITY UPDATE: Potential SQL injection in column aliases via control
    characters
    - debian/patches/CVE-2026-1287.patch: protect against SQL injection in
      column aliases via control characters in
      django/db/models/sql/query.py, tests/aggregation/tests.py,
      tests/annotations/tests.py, tests/queries/tests.py,
      tests/expressions/test_queryset_values.py.
    - CVE-2026-1287
  * SECURITY UPDATE: Potential SQL injection via QuerySet.order_by and
    FilteredRelation
    - debian/patches/CVE-2026-1312-1.patch: protect order_by() from SQL
      injection via aliases with periods in
      django/db/models/sql/compiler.py, tests/ordering/tests.py.
    - debian/patches/CVE-2026-1312-2.patch: raise ValueError when
      FilteredRelation aliases contain periods in
      django/db/models/sql/query.py, tests/filtered_relation/tests.py,
      tests/ordering/tests.py.
    - CVE-2026-1312

 -- Marc Deslauriers <email address hidden> Wed, 28 Jan 2026 08:02:13 -0500

Source diff to previous version
CVE-2025-13473 Username enumeration through timing difference in mod_wsgi authentication handler
CVE-2025-14550 Potential denial-of-service vulnerability via repeated headers when using ASGI
CVE-2026-1207 Potential SQL injection via raster lookups on PostGIS
CVE-2026-1285 Potential denial-of-service vulnerability in django.utils.text.Truncator HTML methods
CVE-2026-1287 Potential SQL injection in column aliases via control characters
CVE-2026-1312 Potential SQL injection via QuerySet.order_by and FilteredRelation

Version: 3:4.2.11-1ubuntu1.13 2025-12-02 21:07:26 UTC

  python-django (3:4.2.11-1ubuntu1.13) noble-security; urgency=medium

  * SECURITY UPDATE: SQL injection in FilteredRelation column aliases on
    PostgreSQL
    - debian/patches/CVE-2025-13372.patch: protect FilteredRelation against
      SQL injection in column aliases in
      django/db/backends/postgresql/compiler.py,
      django/db/backends/postgresql/operations.py,
      tests/annotations/tests.py.
    - CVE-2025-13372
  * SECURITY UPDATE: DoS vulnerability in XML serializer text extraction
    - debian/patches/CVE-2025-64460.patch: corrected quadratic inner text
      accumulation in XML serializer in
      django/core/serializers/xml_serializer.py,
      docs/topics/serialization.txt,
      tests/serializers/test_xml.py.
    - CVE-2025-64460

 -- Marc Deslauriers <email address hidden> Wed, 26 Nov 2025 11:32:26 -0500

Source diff to previous version
CVE-2025-13372 An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4. ...
CVE-2025-64460 An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4. ...

Version: 3:4.2.11-1ubuntu1.12 2025-11-05 22:06:59 UTC

  python-django (3:4.2.11-1ubuntu1.12) noble-security; urgency=medium

  * SECURITY UPDATE: Potential SQL injection in QuerySet and Q objects
    - debian/patches/CVE-2025-62769-1.patch: Add connects and checks for them
      in django/db/models/query_utils.py.
    - debian/patches/CVE-2025-62769-2.patch: Add PROHIBITED_FILTER_KWARGS and
      check for them in django/db/models/query.py.
    - CVE-2025-62769

 -- Hlib Korzhynskyy <email address hidden> Thu, 30 Oct 2025 11:35:52 -0230

Source diff to previous version

Version: 3:4.2.11-1ubuntu1.11 2025-10-02 15:07:03 UTC

  python-django (3:4.2.11-1ubuntu1.11) noble-security; urgency=medium

  * SECURITY UPDATE: Potential SQL injection
    - debian/patches/CVE-2025-59681.patch: protect against SQL injection in
      django/db/models/sql/query.py, tests/aggregation/tests.py,
      tests/annotations/tests.py,
      tests/expressions/test_queryset_values.py, tests/queries/tests.py.
    - CVE-2025-59681
  * SECURITY UPDATE: Potential partial directory-traversal
    - debian/patches/CVE-2025-59682.patch: validate path in
      django/utils/archive.py, tests/utils_tests/test_archive.py.
    - CVE-2025-59682

 -- Marc Deslauriers <email address hidden> Wed, 24 Sep 2025 12:27:58 -0400

Source diff to previous version
CVE-2025-59681 An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. QuerySet.annotate(), QuerySet.alias(), QuerySet.aggrega
CVE-2025-59682 An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by th

Version: 3:4.2.11-1ubuntu1.10 2025-09-04 00:07:54 UTC

  python-django (3:4.2.11-1ubuntu1.10) noble-security; urgency=medium

  * SECURITY UPDATE: SQL injection
    - debian/patches/CVE-2025-57833.patch: protected
      FilteredRelation against SQL injection in column
      aliases in django/db/models/sql/query.py,
      tests/annotations/tests.py.
    - debian/patches/skipping_tests.patch: skipping
      FTBFS tests test_strip_tags.
    - CVE-2025-57833

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 01 Sep 2025 07:55:12 -0300




About   -   Send Feedback to @ubuntu_updates