This bug was fixed in the package python-django - 3:5.2.4-1

---------------
python-django (3:5.2.4-1) experimental; urgency=medium

  * New upstream bugfix release.
    <https://www.djangoproject.com/weblog/2025/jul/02/bugfix-releases/>

 -- Chris Lamb <[email protected]>  Mon, 07 Jul 2025 10:29:43 -0700

python-django (3:5.2.3-1) experimental; urgency=medium

  * New upstream bugfix release.
    <https://www.djangoproject.com/weblog/2025/jun/10/bugfix-releases/>

 -- Chris Lamb <[email protected]>  Tue, 10 Jun 2025 08:53:25 -0700

python-django (3:5.2.2-1) experimental; urgency=medium

  * New upstream security release:

    - CVE-2025-48432: Potential log injection via unescaped request
path.

      Django's internal HTTP response logging used request.path directly,
      allowing control characters (e.g. newlines or ANSI escape sequences) to
      be written unescaped into logs. This could enable log injection or
      forgery, letting attackers manipulate log appearance or structure,
      especially in logs processed by external systems or viewed in terminals.

      Although this does not directly impact Django's security model, it poses
      risks when logs are consumed or interpreted by other tools.  To fix this,
      the internal django.utils.log.log_response() function now escapes all
      positional formatting arguments using a safe encoding.

      (Closes: #1107282)

    <https://www.djangoproject.com/weblog/2025/jun/04/security-
releases/>

 -- Chris Lamb <[email protected]>  Wed, 04 Jun 2025 08:09:36 -0700

python-django (3:5.2.1-1) experimental; urgency=medium

  * New upstream security release:

    - CVE-2025-32873: Denial-of-service possibility in strip_tags()

      django.utils.html.strip_tags() would be slow to evaluate certain inputs
      containing large sequences of incomplete HTML tags. This function is used
      to implement the striptags template filter, which was therefore also
      vulnerable. strip_tags() now raises a SuspiciousOperation exception if it
      encounters an unusually large number of unclosed opening tags.

      (Closes: #1104872)

    <https://www.djangoproject.com/weblog/2025/may/07/security-
releases/>

 -- Chris Lamb <[email protected]>  Wed, 07 May 2025 09:27:26 -0700

python-django (3:5.2-1) experimental; urgency=medium

  * New upstream stable release.
    <https://www.djangoproject.com/weblog/2025/apr/02/django-52-released/>
  * Bump Standards-Version to 4.7.2.

 -- Chris Lamb <[email protected]>  Fri, 04 Apr 2025 09:58:15 -0700

python-django (3:5.2~rc1-1) experimental; urgency=medium

  * New upstream release candidate.
    <https://www.djangoproject.com/weblog/2025/mar/19/django-52-rc1/>

 -- Chris Lamb <[email protected]>  Wed, 19 Mar 2025 12:04:42 +0000

python-django (3:5.2~beta1-1) experimental; urgency=medium

  * New upstream beta release.
    
<https://www.djangoproject.com/weblog/2025/feb/19/django-52-beta-1-released/>
  * Refresh patches.

 -- Chris Lamb <[email protected]>  Wed, 19 Feb 2025 11:41:40 +0000

python-django (3:5.2~alpha1-1) experimental; urgency=medium

  * New upstream alpha release.
    
<https://www.djangoproject.com/weblog/2025/jan/16/django-52-alpha-1-released/>
  * Refresh patches.

 -- Chris Lamb <[email protected]>  Thu, 16 Jan 2025 14:26:59 +0000

python-django (3:5.1.5-1) experimental; urgency=high

  * New upstream security release. (Closes: #1093049)

    - CVE-2024-56374: Potential denial-of-service vulnerability in IPv6
      validation.

      A lack of upper bound limit enforcement in strings passed when performing
      IPv6 validation could have led to a potential denial-of-service (DoS)
      attack. The undocumented and private functions clean_ipv6_address and
      is_valid_ipv6_address were vulnerable, as was the GenericIPAddressField
      form field, which has now been updated to define a max_length of 39
      characters. The GenericIPAddressField model field was not affected.

    <https://www.djangoproject.com/weblog/2025/jan/14/security-
releases/>

 -- Chris Lamb <[email protected]>  Wed, 15 Jan 2025 17:48:05 +0000

python-django (3:5.1.4-1) experimental; urgency=medium

  * New upstream security release:

    - CVE-2024-53907: Potential DoS in django.utils.html.strip_tags.
      The strip_tags() method and striptags template filter were subject to a
      potential denial-of-service attack via certain inputs containing large
      sequences of nested incomplete HTML entities.

    - CVE-2024-53908: Potential SQL injection in HasKey(lhs, rhs) on Oracle
      Direct usage of the django.db.models.fields.json.HasKey lookup on Oracle
      was subject to SQL injection if untrusted data is used as a lhs value.
      Applications that use the jsonfield.has_key lookup through the __ syntax
      are unaffected.

    <https://www.djangoproject.com/weblog/2024/dec/04/security-
releases/>

 -- Chris Lamb <[email protected]>  Wed, 04 Dec 2024 16:55:05 +0000

python-django (3:5.1.3-1) experimental; urgency=medium

  * New upstream bugfix release.
    <https://docs.djangoproject.com/en/5.1/releases/5.1.3/>
  * Refresh patches.

 -- Chris Lamb <[email protected]>  Tue, 05 Nov 2024 07:14:42 -0800

python-django (3:5.1.2-1) experimental; urgency=medium

  * New upstream bugfix release.
    <https://docs.djangoproject.com/en/5.1/releases/5.1.2/>

 -- Chris Lamb <[email protected]>  Tue, 08 Oct 2024 09:56:10 -0700

python-django (3:5.1.1-1) experimental; urgency=high

  * New upstream security release:

    - CVE-2024-45230: Potential denial-of-service vulnerability in
      django.utils.html.urlize(). urlize and urlizetrunc were subject to a
      potential denial-of-service attack via very large inputs with a specific
      sequence of characters.

    - CVE-2024-45231: Potential user email enumeration via response status on
      password reset. Due to unhandled email sending failures, the
      django.contrib.auth.forms.PasswordResetForm class allowed remote
      attackers to enumerate user emails by issuing password reset requests and
      observing the outcomes. To mitigate this risk, exceptions occurring
      during password reset email sending are now handled and logged using the
      django.contrib.auth logger.

  * Bump Standards-Version to 4.7.0.

 -- Chris Lamb <[email protected]>  Tue, 03 Sep 2024 17:25:15 +0100

python-django (3:5.1-1) experimental; urgency=medium

  * New upstream 5.1 release.
    <https://www.djangoproject.com/weblog/2024/aug/07/django-51-released/>

 -- Chris Lamb <[email protected]>  Wed, 07 Aug 2024 16:14:05 +0100

python-django (3:5.1~rc1-1) experimental; urgency=medium

  * New upstream 5.1 release candidate.
    <https://www.djangoproject.com/weblog/2024/jul/24/django-51-rc1/>

 -- Chris Lamb <[email protected]>  Thu, 25 Jul 2024 11:33:24 +0100

python-django (3:5.1~beta1-1) experimental; urgency=medium

  * New upstream beta release.
    
<https://www.djangoproject.com/weblog/2024/jun/26/django-51-beta-1-released/>
  * Add pybuild-plugin-pyproject to Build-Depends.

 -- Chris Lamb <[email protected]>  Wed, 26 Jun 2024 10:15:54 -0700

python-django (3:5.1~alpha1-1) experimental; urgency=medium

  * New upstream experimental alpha release.
    
<https://www.djangoproject.com/weblog/2024/may/22/django-51-alpha-1-released/>
  * Refresh patches.

 -- Chris Lamb <[email protected]>  Thu, 23 May 2024 10:48:03 +0100

python-django (3:5.0.6-1) experimental; urgency=medium

  * New upstream bugfix release, incorporating changes from 5.0.5 as well.
    <https://docs.djangoproject.com/en/5.0/releases/5.0.5/>
    <https://docs.djangoproject.com/en/5.0/releases/5.0.6/>

 -- Chris Lamb <[email protected]>  Wed, 08 May 2024 11:12:00 +0100

python-django (3:5.0.4-1) experimental; urgency=medium

  * New upstream bugfix release.
    <https://docs.djangoproject.com/en/dev/releases/5.0.4/>

 -- Chris Lamb <[email protected]>  Thu, 04 Apr 2024 10:07:42 +0100

python-django (3:5.0.3-1) experimental; urgency=medium

  * New upstream security release:

    - CVE-2024-27351: Fix a potential regular expression denial-of-service
      (ReDoS) attack in django.utils.text.Truncator.words. This method
      (with html=True) and the truncatewords_html template filter were subject
      to a potential regular expression denial-of-service attack via a suitably
      crafted string. This is, in part, a follow up to CVE-2019-14232 and
      CVE-2023-43665.

    <https://docs.djangoproject.com/en/dev/releases/5.0.3/>

 -- Chris Lamb <[email protected]>  Tue, 05 Mar 2024 12:37:11 +0000

python-django (3:5.0.2-1) experimental; urgency=medium

  * New upstream security release:

    - CVE-2024-24680: Potential denial-of-service in intcomma template filter.
      The intcomma template filter was subject to a potential denial-of-service
      attack when used with very long strings.

    <https://docs.djangoproject.com/en/dev/releases/5.0.2/>

 -- Chris Lamb <[email protected]>  Tue, 06 Feb 2024 08:08:50 -0800

python-django (3:5.0.1-1) experimental; urgency=medium

  * New upstream bugfix release.
    <https://docs.djangoproject.com/en/dev/releases/5.0.1/>

 -- Chris Lamb <[email protected]>  Wed, 03 Jan 2024 11:07:26 +0000

python-django (3:5.0-1) experimental; urgency=medium

  * New upstream stable release.
    https://docs.djangoproject.com/en/5.0/releases/5.0/

 -- Chris Lamb <[email protected]>  Thu, 07 Dec 2023 12:52:28 +0000

python-django (3:5.0~rc1-1) experimental; urgency=medium

  * New upstream RC1 release.
    <https://www.djangoproject.com/weblog/2023/nov/20/django-50-rc1/>

 -- Chris Lamb <[email protected]>  Tue, 21 Nov 2023 08:43:43 +0000

python-django (3:5.0~alpha1-1) experimental; urgency=medium

  * New upstream alpha release.
    
<https://www.djangoproject.com/weblog/2023/sep/18/django-50-alpha-1-released/>
  * Refresh patches.

 -- Chris Lamb <[email protected]>  Tue, 19 Sep 2023 11:09:34 -0700

** Changed in: python-django (Ubuntu)
       Status: In Progress => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-14232

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-43665

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-24680

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-27351

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-45230

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-45231

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53907

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53908

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56374

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-32873

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-48432

** Changed in: python-django (Ubuntu)
       Status: Fix Released => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2110437

Title:
  Merge python-django from Debian Unstable for questing

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/2110437/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to