UbuntuUpdates.org

Package "python-django-doc"

Name: python-django-doc

Description:

High-level Python web development framework (documentation)

Latest version: 3:4.2.11-1ubuntu1.3
Release: noble (24.04)
Level: security
Repository: main
Head package: python-django
Homepage: http://www.djangoproject.com/

Links


Download "python-django-doc"


Other versions of "python-django-doc" in Noble

Repository Area Version
base main 3:4.2.11-1ubuntu1
updates main 3:4.2.11-1ubuntu1.3

Changelog

Version: 3:4.2.11-1ubuntu1.3 2024-09-03 19:07:04 UTC

  python-django (3:4.2.11-1ubuntu1.3) noble-security; urgency=medium

  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2024-45230.patch: mitigate
      potential DoS in urlize and urlizetrunc template filters
      in django/utils/html.py,
      tests/template_tests/filter_tests/test_urlize.py,
      tests/utils_tests/test_html.py.
    - CVE-2024-45230
  * SECURITY UPDATE: User email enumeration
    - debian/patches/CVE-2024-45231.patch: avoid
      server error on password reset when email sending fails
      in django/contrib/auth/forms.py,
      tests/auth_tests/test_forms.py,
      tests/mail/custombackend.py.
    - CVE-2024-45231

 -- Leonidas Da Silva Barbosa <email address hidden> Tue, 27 Aug 2024 10:54:30 -0300

Source diff to previous version

Version: 3:4.2.11-1ubuntu1.2 2024-08-06 19:07:19 UTC

  python-django (3:4.2.11-1ubuntu1.2) noble-security; urgency=medium

  * SECURITY UPDATE: Memory exhaustion issue
    - debian/patches/CVE-2024-41989.patch: prevent excessive memory
      consumption in floatformat in django/template/defaultfilters.py,
      tests/template_tests/filter_tests/test_floatformat.py.
    - CVE-2024-41989
  * SECURITY UPDATE: DoS vulnerability in django.utils.html.urlize()
    - debian/patches/CVE-2024-41990.patch: mitigate potential DoS in urlize
      and urlizetrunc template filters in django/utils/html.py,
      tests/utils_tests/test_html.py.
    - CVE-2024-41990
  * SECURITY UPDATE: DoS vulnerability in django.utils.html.urlize() and
    AdminURLFieldWidget
    - debian/patches/CVE-2024-41991.patch: prevented potential ReDoS
      in django/contrib/admin/widgets.py, django/utils/html.py,
      tests/admin_widgets/tests.py, tests/utils_tests/test_html.py.
    - CVE-2024-41991
  * SECURITY UPDATE: SQL injection in QuerySet.values() and values_list()
    - debian/patches/CVE-2024-42005.patch: mitigate QuerySet.values() SQL
      injection attacks against JSON fields in
      django/db/models/sql/query.py, tests/expressions/models.py,
      tests/expressions/test_queryset_values.py.
    - CVE-2024-42005

 -- Marc Deslauriers <email address hidden> Wed, 31 Jul 2024 06:59:00 -0400

Source diff to previous version

Version: 3:4.2.11-1ubuntu1.1 2024-07-09 20:07:12 UTC

  python-django (3:4.2.11-1ubuntu1.1) noble-security; urgency=medium

  * SECURITY UPDATE: DoS in django.utils.html.urlize()
    - debian/patches/CVE-2024-38875.patch: mitigated potential DoS in
      urlize and urlizetrunc template filters in django/utils/html.py,
      tests/utils_tests/test_html.py.
    - CVE-2024-38875
  * SECURITY UPDATE: username enumeration via timing issue
    - debian/patches/CVE-2024-39329.patch: standarized timing of
      verify_password() when checking unusable passwords in
      django/contrib/auth/hashers.py, tests/auth_tests/test_hashers.py.
    - CVE-2024-39329
  * SECURITY UPDATE: directory-traversal via Storage.save()
    - debian/patches/CVE-2024-39330.patch: added extra file name validation
      in Storage's save method in django/core/files/storage/base.py,
      django/core/files/utils.py, tests/file_storage/test_base.py,
      tests/file_storage/tests.py, tests/file_uploads/tests.py.
    - CVE-2024-39330
  * SECURITY UPDATE: DoS in get_supported_language_variant()
    - debian/patches/CVE-2024-39614.patch: mitigated potential DoS in
      django/utils/translation/trans_real.py, docs/ref/utils.txt,
      tests/i18n/tests.py.
    - CVE-2024-39614

 -- Marc Deslauriers <email address hidden> Fri, 05 Jul 2024 07:24:17 -0400




About   -   Send Feedback to @ubuntu_updates