pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/www/py-django



Module Name:    pkgsrc
Committed By:   adam
Date:           Mon Feb 16 12:33:51 UTC 2026

Modified Files:
        pkgsrc/www/py-django: Makefile distinfo
Removed Files:
        pkgsrc/www/py-django: MESSAGE

Log Message:
py-django: updated to 5.2.11

5.2.11

Django 5.2.11 fixes three security issues with severity “high”, two security issues with severity “moderate”, and one security issue with severity “low” in 5.2.10.

CVE-2025-13473: Username enumeration through timing difference in mod_wsgi authentication handler

The django.contrib.auth.handlers.modwsgi.check_password() function for authentication via mod_wsgi allowed remote attackers to enumerate users via a timing attack.

This issue has severity “low” according to the Django security policy.

CVE-2025-14550: Potential denial-of-service vulnerability via repeated headers when using ASGI

When receiving duplicates of a single header, ASGIRequest allowed a remote attacker to cause a potential denial-of-service via a specifically created request with multiple duplicate headers. The 
vulnerability resulted from repeated string concatenation while combining repeated headers, which produced super-linear computation resulting in service degradation or outage.

This issue has severity “moderate” according to the Django security policy.

CVE-2026-1207: Potential SQL injection via raster lookups on PostGIS

Raster lookups on GIS fields (only implemented on PostGIS) were subject to SQL injection if untrusted data was used as a band index.

As a reminder, all untrusted user input should be validated before use.

This issue has severity “high” according to the Django security policy.

CVE-2026-1285: Potential denial-of-service vulnerability in django.utils.text.Truncator HTML methods

django.utils.text.Truncator.chars() and Truncator.words() methods (with html=True) and the truncatechars_html and truncatewords_html template filters were subject to a potential denial-of-service 
attack via certain inputs with a large number of unmatched HTML end tags, which could cause quadratic time complexity during HTML parsing.

This issue has severity “moderate” according to the Django security policy.

CVE-2026-1287: Potential SQL injection in column aliases via control characters

FilteredRelation was subject to SQL injection in column aliases via control characters, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to QuerySet.annotate(), 
aggregate(), extra(), values(), values_list(), and alias().

This issue has severity “high” according to the Django security policy.

CVE-2026-1312: Potential SQL injection via QuerySet.order_by and FilteredRelation

QuerySet.order_by() was subject to SQL injection in column aliases containing periods when the same alias was, using a suitably crafted dictionary, with dictionary expansion, used in FilteredRelation.


To generate a diff of this commit:
cvs rdiff -u -r1.5 -r0 pkgsrc/www/py-django/MESSAGE
cvs rdiff -u -r1.152 -r1.153 pkgsrc/www/py-django/Makefile
cvs rdiff -u -r1.124 -r1.125 pkgsrc/www/py-django/distinfo

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/www/py-django/Makefile
diff -u pkgsrc/www/py-django/Makefile:1.152 pkgsrc/www/py-django/Makefile:1.153
--- pkgsrc/www/py-django/Makefile:1.152 Tue Dec  2 20:37:45 2025
+++ pkgsrc/www/py-django/Makefile       Mon Feb 16 12:33:51 2026
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.152 2025/12/02 20:37:45 adam Exp $
+# $NetBSD: Makefile,v 1.153 2026/02/16 12:33:51 adam Exp $
 
-DISTNAME=      django-5.2.9
+DISTNAME=      django-5.2.11
 PKGNAME=       ${PYPKGPREFIX}-${DISTNAME}
 CATEGORIES=    www python
 MASTER_SITES=  https://www.djangoproject.com/m/releases/${PKGVERSION_NOREV:R}/

Index: pkgsrc/www/py-django/distinfo
diff -u pkgsrc/www/py-django/distinfo:1.124 pkgsrc/www/py-django/distinfo:1.125
--- pkgsrc/www/py-django/distinfo:1.124 Tue Dec  2 20:37:45 2025
+++ pkgsrc/www/py-django/distinfo       Mon Feb 16 12:33:51 2026
@@ -1,5 +1,5 @@
-$NetBSD: distinfo,v 1.124 2025/12/02 20:37:45 adam Exp $
+$NetBSD: distinfo,v 1.125 2026/02/16 12:33:51 adam Exp $
 
-BLAKE2s (django-5.2.9.tar.gz) = 199b4e4431837d8a0ef9dd424c166adf95ba0a2fee61e873d1d81110bc1b9bee
-SHA512 (django-5.2.9.tar.gz) = 669bb4e21b2073fd7a59971efa6d662c5bbfc05284867b562f93b6e56039b06f843726a1a964a4763458c211e238b21d1f91e70cda394d78031a2324bbf35d7f
-Size (django-5.2.9.tar.gz) = 10848762 bytes
+BLAKE2s (django-5.2.11.tar.gz) = a45c7a026b3a5bcd531640d194ea005650e2e9d96647b6030ae4ddb98a9a370d
+SHA512 (django-5.2.11.tar.gz) = 3c82fcd23ecdc2b83fa7fa668389111f88922b16a31e3cd7f279df1cb4bcb0246382bbb8f76fd0d719bef08d0490765cebc0e209d126c932ccc6c6af9ddb43bd
+Size (django-5.2.11.tar.gz) = 10885017 bytes



Home | Main Index | Thread Index | Old Index