Linux repositories inspector

python-django-doc - High-level Python web development framework (documentation)

Django is a high-level web application framework that loosely follows the model-view-controller design pattern.
Python's equivalent to Ruby on Rails, Django lets you build complex data-driven websites quickly and easily - Django focuses on automating as much as possible and adhering to the "Don't Repeat Yourself" (DRY) principle.
Django additionally emphasizes reusability and "pluggability" of components; many generic third-party "applications" are available to enhance projects or to simply to reduce development time even further.
This package contains the HTML documentation and example projects.
3.0.4
Debian iconDebian experimental
2.2.11
Ubuntu iconUbuntu 20.04
2.2.10
Debian iconDebian 10.0
1.11.28
Debian iconDebian 10.0
1.11.27
Debian iconDebian 10.0
1.11.22
Ubuntu iconUbuntu 19.10
1.11.20
Debian iconDebian 9.0
Ubuntu iconUbuntu 19.04
1.11.15
Ubuntu iconUbuntu 18.10
1.11.11
Ubuntu iconUbuntu 18.04 LTS
1.11.4
Ubuntu iconUbuntu 17.10
1.10.7
Debian iconDebian 9.0
1.8.14
CentOS iconCentOS 7.7.1908
1.8.7
Ubuntu iconUbuntu 16.04 LTS
DistributionVersionSincePackageInstalledPackager
CentOS iconCentOS 7.7.1908 opstoolsrpm1.8.14-1.el7Jan 073.98 MiB22.9 MiB
Debian iconDebian 10.0 buster/maindeb1:1.11.27-1~deb10u1Feb 082.56 MiB25.9 MiB
Debian iconDebian 10.0 buster-backports/maindeb2:2.2.10-1~bpo10+1Feb 223.02 MiB28 MiB
Debian iconDebian 10.0 buster-proposed-updates/maindeb1:1.11.28-1~deb10u1Feb 252.52 MiB25.3 MiB
Debian iconDebian experimental experimental/maindeb2:3.0.4-1Mar 043.03 MiB28.3 MiB
Debian iconDebian 9.0 stretch/maindeb1:1.10.7-2+deb9u7Feb 082.42 MiB24.3 MiB
Debian iconDebian 9.0 stretch-backports/maindeb1:1.11.20-1~bpo9+12019-02-222.52 MiB25.2 MiB
Debian iconDebian 9.0 stretch-proposed-updates/maindeb1:1.10.7-2+deb9u8Feb 252.42 MiB24.3 MiB
Ubuntu iconUbuntu 17.10 artful/maindeb1:1.11.4-1ubuntu12017-11-102.51 MiB25.4 MiB
Ubuntu iconUbuntu 17.10 artful-security/maindeb1:1.11.4-1ubuntu1.22018-03-072.51 MiB25.4 MiB
Ubuntu iconUbuntu 17.10 artful-updates/maindeb1:1.11.4-1ubuntu1.22018-03-072.51 MiB25.4 MiB
Ubuntu iconUbuntu 18.04 LTS bionic/maindeb1:1.11.11-1ubuntu12018-06-122.52 MiB25.5 MiB
Ubuntu iconUbuntu 18.04 LTS bionic-security/maindeb1:1.11.11-1ubuntu1.8Mar 042.52 MiB25.5 MiB
Ubuntu iconUbuntu 18.04 LTS bionic-updates/maindeb1:1.11.11-1ubuntu1.8Mar 042.52 MiB25.5 MiB
Ubuntu iconUbuntu 18.10 cosmic/maindeb1:1.11.15-1ubuntu12019-01-142.54 MiB25.8 MiB
Ubuntu iconUbuntu 18.10 cosmic-security/maindeb1:1.11.15-1ubuntu1.3Jul 012.54 MiB25.8 MiB
Ubuntu iconUbuntu 18.10 cosmic-updates/maindeb1:1.11.15-1ubuntu1.3Jul 012.54 MiB25.8 MiB
Ubuntu iconUbuntu 19.04 disco/maindeb1:1.11.20-12019-02-122.55 MiB25.8 MiB
Ubuntu iconUbuntu 19.04 disco-security/maindeb1:1.11.20-1ubuntu0.3Dec 192.55 MiB25.8 MiB
Ubuntu iconUbuntu 19.04 disco-updates/maindeb1:1.11.20-1ubuntu0.3Dec 192.55 MiB25.8 MiB
Ubuntu iconUbuntu 19.10 eoan/maindeb1:1.11.22-1ubuntu1Sep 272.55 MiB25.9 MiB
Ubuntu iconUbuntu 19.10 eoan-security/maindeb1:1.11.22-1ubuntu1.3Mar 042.55 MiB25.9 MiB
Ubuntu iconUbuntu 19.10 eoan-updates/maindeb1:1.11.22-1ubuntu1.3Mar 042.55 MiB25.9 MiB
Ubuntu iconUbuntu 20.04 focal/maindeb2:2.2.11-1Mar 073 MiB28 MiB
Ubuntu iconUbuntu 16.04 LTS xenial/maindeb1.8.7-1ubuntu52017-11-102.6 MiB21.8 MiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb1.8.7-1ubuntu5.12Mar 042.6 MiB21.8 MiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb1.8.7-1ubuntu5.12Mar 042.6 MiB21.8 MiB

Latest updates

Ubuntu icon

Ubuntu 20.04 focal-proposed/main: Version 2:2.2.11-1 removed

Mar 07
Ubuntu icon

Ubuntu 20.04 focal/main: Updated from 2:2.2.10-1ubuntu1 to 2:2.2.11-1

Mar 07
Ubuntu icon

Ubuntu 20.04 focal-proposed/main: Version 2:2.2.11-1 introduced

Mar 06
Ubuntu icon

Ubuntu 20.04 focal-proposed/main: Version 2:2.2.10-1ubuntu1 removed

Mar 05
Ubuntu icon

Ubuntu 20.04 focal/main: Updated from 2:2.2.10-1 to 2:2.2.10-1ubuntu1

Mar 05
  • SECURITY UPDATE: SQL injection in Oracle GIS functions and aggregates
    • debian/patches/CVE-2020-9402.patch: properly escaped tolerance parameter in GIS functions and aggregates on Oracle in django/contrib/gis/db/models/aggregates.py,
      django/contrib/gis/db/models/functions.py,
      tests/gis_tests/distapp/tests.py, tests/gis_tests/geoapp/tests.py.
    • CVE-2020-9402
Debian icon

Debian experimental experimental/main: Updated from 2:3.0.2-1 to 2:3.0.4-1

Mar 04
Ubuntu icon

Ubuntu 20.04 focal-proposed/main: Version 2:2.2.10-1ubuntu1 introduced

Mar 04
  • SECURITY UPDATE: SQL injection in Oracle GIS functions and aggregates
    • debian/patches/CVE-2020-9402.patch: properly escaped tolerance parameter in GIS functions and aggregates on Oracle in django/contrib/gis/db/models/aggregates.py,
      django/contrib/gis/db/models/functions.py,
      tests/gis_tests/distapp/tests.py, tests/gis_tests/geoapp/tests.py.
    • CVE-2020-9402
Ubuntu icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 1.8.7-1ubuntu5.11 to 1.8.7-1ubuntu5.12

Mar 04
  • SECURITY UPDATE: SQL injection in Oracle GIS functions and aggregates
    • debian/patches/CVE-2020-9402.patch: properly escaped tolerance parameter in GIS functions and aggregates on Oracle in django/contrib/gis/db/models/aggregates.py,
      tests/gis_tests/distapp/tests.py, tests/gis_tests/geoapp/tests.py.
    • CVE-2020-9402
Ubuntu icon

Ubuntu 18.04 LTS bionic-updates/main: Updated from 1:1.11.11-1ubuntu1.7 to 1:1.11.11-1ubuntu1.8

Mar 04
  • SECURITY UPDATE: SQL injection in Oracle GIS functions and aggregates
    • debian/patches/CVE-2020-9402.patch: properly escaped tolerance parameter in GIS functions and aggregates on Oracle in django/contrib/gis/db/models/aggregates.py,
      django/contrib/gis/db/models/functions.py,
      tests/gis_tests/distapp/tests.py, tests/gis_tests/geoapp/tests.py.
    • CVE-2020-9402
Ubuntu icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 1.8.7-1ubuntu5.11 to 1.8.7-1ubuntu5.12

Mar 04
  • SECURITY UPDATE: SQL injection in Oracle GIS functions and aggregates
    • debian/patches/CVE-2020-9402.patch: properly escaped tolerance parameter in GIS functions and aggregates on Oracle in django/contrib/gis/db/models/aggregates.py,
      tests/gis_tests/distapp/tests.py, tests/gis_tests/geoapp/tests.py.
    • CVE-2020-9402
Ubuntu icon

Ubuntu 19.10 eoan-security/main: Updated from 1:1.11.22-1ubuntu1.2 to 1:1.11.22-1ubuntu1.3

Mar 04
  • SECURITY UPDATE: SQL injection in Oracle GIS functions and aggregates
    • debian/patches/CVE-2020-9402.patch: properly escaped tolerance parameter in GIS functions and aggregates on Oracle in django/contrib/gis/db/models/aggregates.py,
      django/contrib/gis/db/models/functions.py,
      tests/gis_tests/distapp/tests.py, tests/gis_tests/geoapp/tests.py.
    • CVE-2020-9402
Ubuntu icon

Ubuntu 18.04 LTS bionic-security/main: Updated from 1:1.11.11-1ubuntu1.7 to 1:1.11.11-1ubuntu1.8

Mar 04
  • SECURITY UPDATE: SQL injection in Oracle GIS functions and aggregates
    • debian/patches/CVE-2020-9402.patch: properly escaped tolerance parameter in GIS functions and aggregates on Oracle in django/contrib/gis/db/models/aggregates.py,
      django/contrib/gis/db/models/functions.py,
      tests/gis_tests/distapp/tests.py, tests/gis_tests/geoapp/tests.py.
    • CVE-2020-9402
Ubuntu icon

Ubuntu 19.10 eoan-updates/main: Updated from 1:1.11.22-1ubuntu1.2 to 1:1.11.22-1ubuntu1.3

Mar 04
  • SECURITY UPDATE: SQL injection in Oracle GIS functions and aggregates
    • debian/patches/CVE-2020-9402.patch: properly escaped tolerance parameter in GIS functions and aggregates on Oracle in django/contrib/gis/db/models/aggregates.py,
      django/contrib/gis/db/models/functions.py,
      tests/gis_tests/distapp/tests.py, tests/gis_tests/geoapp/tests.py.
    • CVE-2020-9402
Debian icon

Debian 9.0 stretch-proposed-updates/main: Version 1:1.10.7-2+deb9u8 introduced

Feb 25
  • CVE-2020-7471: Prevent a Potential SQL injection via StringAgg(delimiter). (Closes: #950581)

Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows
SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in
Django applications that offer downloads of data as a series of rows with a
user-specified column delimiter). By passing a suitably crafted delimiter
to a contrib.postgres.aggregates.StringAgg instance, it was possible to
break escaping and inject malicious SQL.

Debian icon

Debian 10.0 buster-proposed-updates/main: Version 1:1.11.28-1~deb10u1 introduced

Feb 25
  • CVE-2020-7471: Potential SQL injection via StringAgg(delimiter)

Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3
allows SQL Injection if untrusted data is used as a StringAgg delimiter
(e.g., in Django applications that offer downloads of data as a series of
rows with a user-specified column delimiter). By passing a suitably
crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it
was possible to break escaping and inject malicious SQL.

Debian icon

Debian 10.0 buster-backports/main: Updated from 2:2.2.9-2~bpo10+1 to 2:2.2.10-1~bpo10+1

Feb 22
  • Rebuild for buster-backports.
  • Add a Breaks against python3-django-filter (<< 2.1.0-1).
Debian icon

Debian 10.0 buster-proposed-updates/main: Version 1:1.11.27-1~deb10u1 removed

Feb 08
Debian icon

Debian 10.0 buster/main: Updated from 1:1.11.23-1~deb10u1 to 1:1.11.27-1~deb10u1

Feb 08
  • CVE-2019-19844: Potential account hijack via password reset form.

By submitting a suitably crafted email address making use of Unicode
characters, that compared equal to an existing user email when
lower-cased for comparison, an attacker could be sent a password reset
token for the matched account.

In order to avoid this vulnerability, password reset requests now compare
the submitted email using the stricter, recommended algorithm for
case-insensitive comparison of two identifiers from Unicode Technical
Report 36, section 2.11.2(B)(2). Upon a match, the email containing the
reset token will be sent to the email address on record rather than the
submitted address.

Debian icon

Debian 9.0 stretch-proposed-updates/main: Version 1:1.10.7-2+deb9u7 removed

Feb 08
Debian icon

Debian 9.0 stretch/main: Updated from 1:1.10.7-2+deb9u6 to 1:1.10.7-2+deb9u7

Feb 08
  • CVE-2019-19844: Prevent a potential account hijack via the password reset form. (Closes: #946937)

Related packages

python - interactive high-level object-oriented language (default version)
python-django - A high-level Python Web framework that encourages rapid development and clean design
⇧ Top