Debian Patches

Status for python-django/3:3.2.19-1+deb12u2

Patch Description Author Forwarded Bugs Origin Last update
0001-disable-sources-in-sphinxdoc.diff Disable creation of _sources directory by Sphinx
We do this to save some space as the sources of the documentation
are not really useful in a binary package.
.
This is a Debian specific patch.
=?utf-8?q?Rapha=C3=ABl_Hertzog?= <hertzog@debian.org> not-needed vendor 2015-10-11
0002-use_debian_geoip_database_as_default.diff Use Debian GeoIP database path as default
Default to Debian standard path for GeoIP directory and for GeoIP city
file. Avoids the need to declare them in each project.
.
This is a Debian specific patch.
Tapio Rantala <tapio.rantala@iki.fi> not-needed debian 2015-10-11
0004-Use-locally-installed-documentation-sources.patch Use locally installed documentation sources Brian May <bam@debian.org> no 2017-06-24
0004-Set-the-default-shebang-to-new-projects-to-use-Pytho.patch Set the default shebang to new projects to use Python 3. Chris Lamb <lamby@debian.org> no 2017-09-24
0005-Use-usr-bin-env-python3-shebang-for-django-admin.py.patch Use #!/usr/bin/env python3 shebang for django-admin.py. Chris Lamb <lamby@debian.org> no 2017-09-26
0006-Fixed-32690-Fixed-__in-lookup-crash-when-combining-w.patch Fixed #32690 -- Fixed __in lookup crash when combining with filtered aggregates.

Having lookups group by subquery right-hand-sides is likely unnecessary
in the first place but relatively large amount of work would be needed
to achieve that such as making Lookup instances proper resolvable
expressions.

Regression in 35431298226165986ad07e91f9d3aca721ff38ec.

Thanks James A. Munsch for the report.

(cherry picked from commit 136ff592ad8aa8b7fa1e61435e5501cc98ce8573)
Simon Charette <charette.s@gmail.com> no 2021-05-04
0007-Refs-32786-Made-Query.clear_ordering-not-to-cause-si.patch Refs #32786 -- Made Query.clear_ordering() not to cause side effects by default.

(cherry picked from commit 053141d31fe5aef1c255a1be183383860e0ccce9)
Hannes Ljungberg <hannes.ljungberg@gmail.com> no 2021-05-26
0008-Refs-32690-Altered-lookups-Query-rhs-alterations-dur.patch Refs #32690 -- Altered lookups Query rhs alterations during initialization.

Having it happen at the lookup creation time ensures entry points
called before the compilation phase (e.g. get_group_by_cols) don't have
to duplicate the logic in charge of altering Query instances used as
rhs.

It also has the nice effect of reducing the amount of time the
alteration logic to once as opposed to multiple times if the queryset
is compiled more than once.

(cherry picked from commit e3bde71676a704e27d62e5f96dd967f7305db7f2)
Simon Charette <charette.s@gmail.com> no 2021-12-01
0009-Fixed-33282-Fixed-a-crash-when-OR-ing-subquery-and-a.patch Fixed #33282 -- Fixed a crash when OR'ing subquery and aggregation lookups.

As a QuerySet resolves to Query the outer column references grouping logic
should be defined on the latter and proxied from Subquery for the cases where
get_group_by_cols is called on unresolved expressions.

Thanks Antonio Terceiro for the report and initial patch.

(cherry picked from commit e5a92d400acb4ca6a8e1375d1ab8121f2c7220be)
Simon Charette <charette.s@gmail.com> no 2021-12-01
0011-Moved-RequestSite-import-to-the-toplevel.patch Moved RequestSite import to the toplevel.
Via https://github.com/django/django/commit/78163d1ac4407d59bfc5fdf1f84f2dbbb2ed3443
Claude Paroz <claude@2xlibre.net> no 2021-11-11
0012-Add-Python-3.11-support-for-tests.patch Fix test_runner/test_utils tests on Python 3.11+.

Python 3.11 uses fully qualified test name in unittest output. See
https://github.com/python/cpython/commit/755be9b1505af591b9f2ee424a6525b6c2b65ce9
Python 3.11 while transitioning to Django 4.x
Mariusz Felisiak <felisiak.mariusz@gmail.com> no upstream, https://github.com/django/django/commit/2ee4caf56b8e000cabbb73ad81ff05738d6d0a35 2023-01-06
0013-fix-url-validator.patch Fixed URLValidator crash in some edge cases Pedro Schlickmann Mendes <windowsxpedro@gmail.com> yes upstream upstream, https://github.com/django/django/commit/e8b4feddc34ffe5759ec21da8fa027e86e653f1c 2021-12-15
0014-CVE-2023-36053.patch [PATCH] [3.2.x] Fixed CVE-2023-36053 -- Prevented potential ReDoS in EmailValidator and URLValidator.

Thanks Seokchan Yoon for reports.
Mariusz Felisiak <felisiak.mariusz@gmail.com> no 2023-06-14
0015-CVE-2024-39329.patch commit 5d8645857936c142a3973694799c52165e2bdcdb

Fixed CVE-2024-39329 -- Standarized timing of verify_password() when checking unusuable passwords.

Refs #20760.

Thanks Michael Manfre for the fix and to Adam Johnson for the review.

diff --git a/django/contrib/auth/hashers.py b/django/contrib/auth/hashers.py
index 86ae7f42a..ee81b641d 100644
Michael Manfre <mike@manfre.net> no 2024-06-14
0016-CVE-2024-39330.patch commit fe4a0bbe2088d0c2b331216dad21ccd0bb3ee80d

Fixed CVE-2024-39330 -- Added extra file name validation in Storage's save method.

Thanks to Josh Schneier for the report, and to Carlton Gibson and Sarah
Boyce for the reviews.

diff --git a/django/core/files/storage.py b/django/core/files/storage.py
index 22984f949..680f5ec91 100644
Natalia <124304+nessita@users.noreply.github.com> no 2024-03-20
0017-CVE-2024-39614-1.patch commit 9e9792228a6bb5d6402a5d645bc3be4cf364aefb

Fixed CVE-2024-39614 -- Mitigated potential DoS in get_supported_language_variant().

Language codes are now parsed with a maximum length limit of 500 chars.

Thanks to MProgrammer for the report.

diff --git a/django/utils/translation/trans_real.py b/django/utils/translation/trans_real.py
index b262a5000..92442185f 100644
Sarah Boyce <42296566+sarahboyce@users.noreply.github.com> no 2024-06-26
0018-CVE-2024-39614-2.patch commit 0e94f292cda632153f2b3d9a9037eb0141ae9c2e

Fixed #35627 -- Raised a LookupError rather than an unhandled ValueError in get_supported_language_variant().

LocaleMiddleware didn't handle the ValueError raised by
get_supported_language_variant() when language codes were
over 500 characters.

Regression in 9e9792228a6bb5d6402a5d645bc3be4cf364aefb.

===================================================================
Lorenzo Peña <lorinkoz@gmail.com> no 2024-07-23
0019-CVE-2024-41989.patch commit c19465ad87e33b6122c886b97a202ad54cd43672

Fixed CVE-2024-41989 -- Prevented excessive memory consumption in floatformat.

Thanks Elias Myllymäki for the report.

Co-authored-by: Shai Berger <shai@platonix.com>

diff --git a/django/template/defaultfilters.py b/django/template/defaultfilters.py
index 02cac06bcf..66c6e76d20 100644
Sarah Boyce <42296566+sarahboyce@users.noreply.github.com> no 2024-07-12
0020-CVE-2024-41991.patch commit 5f1757142febd95994caa1c0f64c1a0c161982c3

Fixed CVE-2024-41991 -- Prevented potential ReDoS in django.utils.html.urlize() and AdminURLFieldWidget.

Thanks Seokchan Yoon for the report.

Co-authored-by: Sarah Boyce <42296566+sarahboyce@users.noreply.github.com>

diff --git a/django/contrib/admin/widgets.py b/django/contrib/admin/widgets.py
index aeb74773a..b7dd0d87a 100644
Mariusz Felisiak <felisiak.mariusz@gmail.com> no 2024-07-10
0021-CVE-2024-42005.patch commit c87bfaacf8fb84984243b5055dc70f97996cb115

Fixed CVE-2024-42005 -- Mitigated QuerySet.values() SQL injection attacks against JSON fields.

Thanks Eyal (eyalgabay) for the report.

===================================================================
Simon Charette <charette.s@gmail.com> no 2024-07-25

All known versions for source package 'python-django'

Links