python-django (1:1.10.7-2+deb9u27) stretch-security; urgency=high

  * Non-maintainer upload by the ELTS security team. (Closes: #1116979)
  * CVE-2025-59681: Fix a potential SQL injection in QuerySet.annotate(),
    alias(), aggregate() and extra(). These methods were subject to SQL
    injection in column aliases, using a suitably crafted dictionary via
    dictionary expansion as the **kwargs passed to these methods on MySQL
    and MariaDB.
  * CVE-2025-59682: Fix a potential partial directory-traversal vulnerability
    in archive.extract(). This function, used by startapp --template and
    startproject --template, allowed partial directory-traversal via an archive
    with file paths sharing a common prefix with the target directory.

 -- Chris Lamb <lamby@debian.org>  Tue, 07 Oct 2025 13:25:50 -0700

python-django (1:1.10.7-2+deb9u26) stretch-security; urgency=high

  * Non-maintainer upload by the ELTS security team.
  * CVE-2025-32873: Prevent an issue where the strip_tags() function in
    django.utils.html was vulnerable to a potential denial-of-service (DoS)
    attack when processing inputs containing large sequences of incomplete HTML
    tags. The template filter striptags was also vulnerable, as it is built on
    top of strip_tags(). (Closes: #1104872)

 -- Chris Lamb <lamby@debian.org>  Fri, 13 Jun 2025 11:14:53 -0700

python-django (1:1.10.7-2+deb9u25) stretch-security; urgency=high

  * Non-maintainer upload by the ELTS security team.
  * CVE-2025-26699: Prevent a potential denial-of-service in the wrap()
    method of the django.utils.text module. This method (and the wordwrap
    template filter) were subject to a potential DoS attack when used with very
    long strings. (Closes: #1099682)
  * Fix compatibility with CVE-2024-11168 and CVE-2025-0938 after the upload of
    python2.7 version 2.7.13-2+deb9u10.
  * Autopkgtest changes:
    - Ensure that the Python 3.x version of manage.py-pl is executable; required for the autopkgtests:
    - Adjust the autopkgtest definitions in order to request that this package
      (ie. python-django) is tested when python2.7 or python3.5 is updated
    - Permit autopkgtests to print to stderr. This is required on stretch due
      to libeatmydata.so emitting a (harmless) warning error.
  * Allow reprotest and armhf build failures in the Salsa CI.

 -- Chris Lamb <lamby@debian.org>  Wed, 26 Mar 2025 11:44:43 +0000

python-django (1:1.10.7-2+deb9u24) stretch-security; urgency=high

  * Non-maintainer upload by the ELTS security team.
  * CVE-2024-53907: Prevent a potential Denial of Service (DoS) attack. The
    strip_tags method and striptags template filter were subject to a
    potential denial-of-service attack via certain inputs containing large
    sequences of nested incomplete HTML entities.
  * CVE-2024-56374: Prevent another potential Denial of Service (DoS) attack.
    Lack of upper-bound limit enforcement in strings passed when performing
    IPv6 validation could have led to a potential denial-of-service attack.
    The clean_ipv6_address and is_valid_ipv6_address functions were vulnerable
    as was the GenericIPAddressField form field. The GenericIPAddressField
    model field was not affected. (Closes: #1093049)

 -- Chris Lamb <lamby@debian.org>  Tue, 28 Jan 2025 10:55:57 +0000

python-django (1:1.10.7-2+deb9u23) stretch-security; urgency=high

  * Non-maintainer upload by the ELTS security team.
  * CVE-2024-41989: The floatformat template filter was subject to
    significant memory consumption when given a string representation of a
    number in scientific notation with a large exponent. (Closes: #1078074)

 -- Chris Lamb <lamby@debian.org>  Tue, 27 Aug 2024 13:40:56 +0100

python-django (1:1.10.7-2+deb9u22) stretch-security; urgency=high

  [ Chris Lamb ]
  * Non-maintainer upload by the Debian ELTS team.
  * Update tests now that urllib.parse in python3-six has been changed to strip
    ASCII newlines and tabs.
  * CVE-2023-36053: Prevent a potential regular expression denial of service
    (DoS) vulnerability in EmailValidator and URLValidator. EmailValidator and
    URLValidator were subject to potential regular expression denial of service
    attack via a very large number of domain name labels of emails and URLs.
    (Closes: #1040225)

  [ Daniel Leidert ]
  * CVE-2023-43665: Fix a DoS vulnuerability in django.utils.text.Truncator.
    Following the fix for CVE-2019-14232, the regular expressions used in the
    implementation of django.utils.text.Truncator’s chars() and words() methods
    were revised and improved. However, these regular expressions still
    exhibited linear backtracking complexity, so when given a very long,
    potentially malformed HTML input, the evaluation would still be slow,
    leading to a potential denial of service vulnerability. (Closes: #1053475)
  * CVE-2024-24680: Prevent a potential DoS in the intcomma template filter.
    The intcomma template filter was subject to a potential denial-of-service
    attack when used with very long strings.

 -- Chris Lamb <lamby@debian.org>  Wed, 29 May 2024 09:46:29 +0100

python-django (1:1.10.7-2+deb9u21) stretch-security; urgency=high

  * CVE-2023-41164: Potential denial of service vulnerability in
    django.utils.encoding.uri_to_iri(). This method was subject to potential
    denial of service attack via certain inputs with a very large number of
    Unicode characters. (Closes: #1051226)

 -- Chris Lamb <lamby@debian.org>  Thu, 07 Sep 2023 13:25:17 -0700

python-django (1:1.10.7-2+deb9u20) stretch-security; urgency=high

  * CVE-2021-45115: Denial-of-service possibility in the
    UserAttributeSimilarityValidator class.

    UserAttributeSimilarityValidator incurred significant overhead evaluating
    submitted password that were artificially large in relative to the
    comparison values. On the assumption that access to user registration was
    unrestricted this provided a potential vector for a denial-of-service
    attack.

    In order to mitigate this issue, relatively long values are now ignored by
    UserAttributeSimilarityValidator.

  * CVE-2021-45116: Potential information disclosure in dictsort template
    filter

    Due to leveraging the Django Template Language's variable resolution logic,
    the dictsort template filter was potentially vulnerable to information
    disclosure or unintended method calls, if passed a suitably crafted key.

    In order to avoid this possibility, dictsort now works with a restricted
    resolution logic, that will not call methods, nor allow indexing on
    dictionaries.

  * CVE-2021-45452: Potential directory-traversal via Storage.save()

    Storage.save() allowed directory-traversal if directly passed suitably
    crafted file names.

  * CVE-2023-24580: Potential denial-of-service vulnerability in file uploads

    Passing certain inputs to multipart forms could result in too many open
    files or memory exhaustion, and provided a potential vector for a
    denial-of-service attack.

    The number of files parts parsed is now limited via the new
    DATA_UPLOAD_MAX_NUMBER_FILES setting. Thanks to Jakob Ackermann for the
    report. (Closes: #1031290)

  * CVE-2023-31047: Prevent a potential bypass of validation when uploading
    multiple files using one form field.

    Uploading multiple files using one form field has never been supported by
    forms.FileField or forms.ImageField as only the last uploaded file was
    validated. Unfortunately, Uploading multiple files topic suggested
    otherwise. In order to avoid the vulnerability, the ClearableFileInput and
    FileInput form widgets now raise ValueError when the multiple HTML
    attribute is set on them. To prevent the exception and keep the old
    behavior, set the allow_multiple_selected attribute to True.
    (Closes: #1035467)

 -- Chris Lamb <lamby@debian.org>  Fri, 04 Aug 2023 12:59:22 +0100

python-django (1:1.10.7-2+deb9u19) stretch-security; urgency=high

  * CVE-2023-23969: Prevent a potential Denial of Service vulnerability with
    pathological values for the Accept-Language header.

    The parsed values of Accept-Language headers are cached in order to avoid
    repetitive parsing. This could have led to a potential denial-of-service
    vector via excessive memory usage if the raw value of Accept-Language
    headers was very large.

    Accept-Language headers are now limited to a maximum length in order to
    avoid this issue. (Closes: #1030251)
  * Disable piuparts testing.

 -- Chris Lamb <lamby@debian.org>  Wed, 01 Feb 2023 12:37:27 -0800

python-django (1:1.10.7-2+deb9u18) stretch; urgency=high

  * CVE-2022-34265: An issue was discovered in Django 3.2 before 3.2.14 and 4.0
    before 4.0.6. The Trunc() and Extract() database functions are subject to
    SQL injection if untrusted data is used as a kind/lookup_name value.
    Applications that constrain the lookup name and kind choice to a known safe
    list are unaffected. (Closes: #1014541)

 -- Chris Lamb <lamby@debian.org>  Wed, 13 Jul 2022 15:20:04 +0100

python-django (1:1.10.7-2+deb9u17) stretch-security; urgency=high

  * Upload from the LTS security team to sync with Debian buster:

    - CVE-2020-9402: Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0
      before 3.0.4 allows SQL Injection if untrusted data is used as a
      tolerance parameter in GIS functions and aggregates on Oracle. By passing
      a suitably crafted tolerance to GIS functions and aggregates on Oracle,
      it was potentially possible to break escaping and inject malicious SQL.
      (Closes: #953102)

 -- Chris Lamb <lamby@debian.org>  Thu, 26 May 2022 11:41:13 +0100

python-django (1:1.10.7-2+deb9u16) stretch-security; urgency=high

  * Upload from the LTS security team:

    - CVE-2022-28346: Potential SQL injection in QuerySet.annotate(),
      aggregate(), and extra().

      QuerySet.annotate(), aggregate(), and extra() methods were subject to SQL
      injection in column aliases, using a suitably crafted dictionary, with
      dictionary expansion, as the **kwargs passed to these methods.

    See <https://www.djangoproject.com/weblog/2022/apr/11/security-releases/>
    for more information. (Closes: #1009677)

 -- Chris Lamb <lamby@debian.org>  Thu, 14 Apr 2022 16:31:41 +0100

python-django (1:1.10.7-2+deb9u15) stretch-security; urgency=high

  * Upload from the LTS security team:

    - CVE-2022-22818: Possible XSS via {% debug %} template tag.

      The {% debug %} template tag didn't properly encode the current context,
      posing an XSS attack vector.

      In order to avoid this vulnerability, {% debug %} no longer outputs
      information when the DEBUG setting is False, and it ensures all context
      variables are correctly escaped when the DEBUG setting is True.

    - CVE-2022-23833: Denial-of-service possibility in file uploads

      Passing certain inputs to multipart forms could result in an
      infinite loop when parsing files.

    See <https://www.djangoproject.com/weblog/2022/feb/01/security-releases/>
    for more information. (Closes: #1004752)

 -- Chris Lamb <lamby@debian.org>  Tue, 01 Feb 2022 10:12:18 -0800

python-django (1:1.10.7-2+deb9u14) stretch-security; urgency=high

  * Upload from the LTS security team. (Closes: #989394)
  * CVE-2021-33203: Potential directory traversal via admindocs

    Staff members could use the admindocs TemplateDetailView view to
    check the existence of arbitrary files. Additionally, if (and only
    if) the default admindocs templates have been customized by the
    developers to also expose the file contents, then not only the
    existence but also the file contents would have been exposed.

    As a mitigation, path sanitation is now applied and only files
    within the template root directories can be loaded.

    This issue has low severity, according to the Django security
    policy.

    Thanks to Rasmus Lerchedahl Petersen and Rasmus Wriedt Larsen from
    the CodeQL Python team for the report.

  * CVE-2021-33571: Possible indeterminate SSRF, RFI, and LFI attacks
    since validators accepted leading zeros in IPv4 addresses

    URLValidator, validate_ipv4_address(), and
    validate_ipv46_address() didn't prohibit leading zeros in octal
    literals. If you used such values you could suffer from
    indeterminate SSRF, RFI, and LFI attacks.

    validate_ipv4_address() and validate_ipv46_address() validators
    were not affected on Python 3.9.5+.

    This issue has medium severity, according to the Django security
    policy.

 -- Chris Lamb <lamby@debian.org>  Sat, 05 Jun 2021 10:40:51 +0100

python-django (1:1.10.7-2+deb9u13) stretch-security; urgency=high

  * CVE-2021-31542: Fix a potential directory-traversal vulnerability that
    could have been exploited by uploaded files. The MultiPartParser,
    UploadedFile and FieldFile classes allowed directory-traversal via uploaded
    files with suitably crafted file names. In order to mitigate this risk,
    stricter basename and path sanitation is now applied. Specifically, empty
    file names and paths with dot segments are rejected. (Closes: #988053)

 -- Chris Lamb <lamby@debian.org>  Thu, 06 May 2021 10:17:00 +0100

python-django (1:1.10.7-2+deb9u12) stretch-security; urgency=high

  * CVE-2021-28658: Prevent a directory traversal issue which could have been
    exploited by maliciously crafted filenames. However, the built-in upload
    handlers were not affected by this vulnerability. (Closes: #986447)

 -- Chris Lamb <lamby@debian.org>  Fri, 09 Apr 2021 12:28:23 +0100

python-django (1:1.10.7-2+deb9u11) stretch-security; urgency=high

  * Apply security fix from upstream:

    - CVE-2021-23336: Prevent a web cache poisoning attack via "parameter
      cloaking". Django contains a copy of urllib.parse.parse_qsl() which was
      added to backport some security fixes. A further security fix has been
      issued recently such that parse_qsl() no longer allows using ";" as a
      query parameter separator by default. (Closes: #983090)

    <https://www.djangoproject.com/weblog/2021/feb/19/security-releases/>

 -- Chris Lamb <lamby@debian.org>  Fri, 19 Feb 2021 12:21:16 +0000

python-django (1:1.10.7-2+deb9u10) stretch-security; urgency=high

  * CVE-2021-3281: Fix a potential directory-traversal via archive.extract().

    The django.utils.archive.extract() function, used by startapp --template
    and startproject --template, allowed directory-traversal via an archive
    with absolute paths or relative paths with dot segments.

    <https://www.djangoproject.com/weblog/2021/feb/01/security-releases/>

    (Closes: #981562)

 -- Chris Lamb <lamby@debian.org>  Mon, 01 Feb 2021 18:15:23 +0000

python-django (1:1.10.7-2+deb9u9) stretch-security; urgency=high

  * CVE-2020-13254: Potential a data leakage via malformed memcached keys.

    In cases where a memcached backend does not perform key validation, passing
    malformed cache keys could result in a key collision, and potential data
    leakage. In order to avoid this vulnerability, key validation is added to
    the memcached cache backends.

  * CVE-2020-13596: Possible XSS via admin ForeignKeyRawIdWidget.

    Query parameters to the admin ForeignKeyRawIdWidget were not properly URL
    encoded, posing an XSS attack vector. ForeignKeyRawIdWidget now ensures
    query parameters are correctly URL encoded.

 -- Chris Lamb <lamby@debian.org>  Sat, 13 Jun 2020 15:47:14 +0100

python-django (1:1.10.7-2+deb9u8) stretch-security; urgency=high

  * CVE-2020-7471: Prevent a Potential SQL injection via StringAgg(delimiter).
    (Closes: #950581)

    Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows
    SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in
    Django applications that offer downloads of data as a series of rows with a
    user-specified column delimiter). By passing a suitably crafted delimiter
    to a contrib.postgres.aggregates.StringAgg instance, it was possible to
    break escaping and inject malicious SQL.

 -- Chris Lamb <lamby@debian.org>  Sat, 15 Feb 2020 10:25:11 +0000

python-django (1:1.10.7-2+deb9u7) stretch-security; urgency=high

  * CVE-2019-19844: Prevent a potential account hijack via the password reset
    form. (Closes: #946937)

 -- Chris Lamb <lamby@debian.org>  Mon, 06 Jan 2020 17:52:10 +0000

python-django (1:1.10.7-2+deb9u6) stretch-security; urgency=high

  * Backport four security patches from upstream. (Closes: #934026)
    <https://www.djangoproject.com/weblog/2019/aug/01/security-releases/>

    - CVE-2019-14232: Denial-of-service possibility in
      django.utils.text.Truncator

      If django.utils.text.Truncator's chars() and words() methods were passed
      the html=True argument, they were extremely slow to evaluate certain
      inputs due to a catastrophic backtracking vulnerability in a regular
      expression. The chars() and words() methods are used to implement the
      truncatechars_html and truncatewords_html template filters, which were
      thus vulnerable.

      The regular expressions used by Truncator have been simplified in order
      to avoid potential backtracking issues. As a consequence, trailing
      punctuation may now at times be included in the truncated output.

    - CVE-2019-14233: Denial-of-service possibility in strip_tags()

      Due to the behavior of the underlying HTMLParser,
      django.utils.html.strip_tags() would be extremely slow to evaluate
      certain inputs containing large sequences of nested incomplete HTML
      entities. The strip_tags() method is used to implement the corresponding
      striptags template filter, which was thus also vulnerable.

      strip_tags() now avoids recursive calls to HTMLParser when progress
      removing tags, but necessarily incomplete HTML entities, stops being
      made.

      Remember that absolutely NO guarantee is provided about the results of
      strip_tags() being HTML safe. So NEVER mark safe the result of a
      strip_tags() call without escaping it first, for example with
      django.utils.html.escape().

    - CVE-2019-14234: SQL injection possibility in key and index lookups for
      JSONField/HStoreField

      Key and index lookups for django.contrib.postgres.fields.JSONField and
      key lookups for django.contrib.postgres.fields.HStoreField were subject
      to SQL injection, using a suitably crafted dictionary, with dictionary
      expansion, as the **kwargs passed to QuerySet.filter().

    - CVE-2019-14235: Potential memory exhaustion in
      django.utils.encoding.uri_to_iri()

      If passed certain inputs, django.utils.encoding.uri_to_iri could lead to
      significant memory usage due to excessive recursion when
      re-percent-encoding invalid UTF-8 octet sequences.

      uri_to_iri() now avoids recursion when re-percent-encoding invalid UTF-8
      octet sequences.

 -- Chris Lamb <lamby@debian.org>  Thu, 08 Aug 2019 10:42:49 +0100

python-django (1:1.10.7-2+deb9u5) stretch-security; urgency=high

  * CVE-2019-6975: Fix memory exhaustion in utils.numberformat.format().
    (Closes: #922027)
  * CVE-2019-12308: Prevent a XSS vulnerability in the Django admin via the
    AdminURLFieldWidget. (Closes: #929927)
  * CVE-2019-12781: Prevent incorrect HTTPS detection with reverse-proxies
    connecting via HTTPS. (Closes: #931316)

 -- Chris Lamb <lamby@debian.org>  Tue, 02 Jul 2019 23:07:21 -0300

python-django (1:1.10.7-2+deb9u4) stretch-security; urgency=high

  * CVE-2019-3498: Prevent a content-spoofing vulnerability in the default
    404 page. (Closes: #918230)

 -- Chris Lamb <lamby@debian.org>  Sun, 06 Jan 2019 09:35:11 +0100

python-django (1:1.10.7-2+deb9u3) stretch; urgency=medium

  * Default to supporting Spatialite >= 4.2. (Closes: #910240)

 -- Chris Lamb <lamby@debian.org>  Thu, 11 Oct 2018 18:47:12 +0100

python-django (1:1.10.7-2+deb9u2) stretch-security; urgency=high

  * Non-maintainer upload by the Security Team.
  * CVE-2018-14574: Fix an open redirect possibility in CommonMiddleware.
    If the django.middleware.common.CommonMiddleware and the APPEND_SLASH
    setting were both enabled, and if the project has a URL pattern that
    accepted any path ending in a slash then a request to a maliciously crafted
    URL of that site could lead to a redirect to another site, enabling
    phishing and other attacks. (Closes: #905216)
  * CVE-2017-12794: Fix a cross-site scripting attack in the technical HTTP 500
    page. This vulnerability did not affect production sites as they typically
    do not run with "DEBUG = True". (Closes: #874415)

 -- Chris Lamb <lamby@debian.org>  Fri, 03 Aug 2018 15:11:16 +0800

python-django (1:1.10.7-2+deb9u1) stretch-security; urgency=high

  * Non-maintainer upload by the LTS Team.
  * Fix CVE-2018-7536: Denial-of-service possibility in ``urlize`` and
    ``urlizetrunc`` template filters
  * Fix CVE-2018-7537: Denial-of-service possibility in `truncatechars_html``
    and ``truncatewords_html`` template filters

 -- Brian May <bam@debian.org>  Fri, 30 Mar 2018 09:32:16 +1100

python-django (1:1.10.7-2) unstable; urgency=medium

  * Accept again migrations depending on initial migrations that
    can be fake applied. Closes: #863267
  * Add patch to fix DEP-8 test. Closes: #816435

 -- Raphaël Hertzog <hertzog@debian.org>  Mon, 29 May 2017 16:59:51 +0200

python-django (1:1.10.7-1) unstable; urgency=medium

  * New upstream security release:

    - CVE-2017-7233: Open redirect and possible XSS attack via user-supplied
      numeric redirect URLs.

      Django relies on user input in some cases (e.g.
      django.contrib.auth.views.login() and i18n) to redirect the user to an
      "on success" URL. The security check for these redirects (namely
      django.utils.http.is_safe_url()) considered some numeric URLs (e.g.
      http:999999999) "safe" when they shouldn't be.

      Also, if a developer relies on is_safe_url() to provide safe redirect
      targets and puts such a URL into a link, they could suffer from an XSS
      attack. (Closes: #859515)

    - CVE-2017-7234: Open redirect vulnerability in django.views.static.serve().

      A maliciously crafted URL to a Django site using the
      django.views.static.serve() view could redirect to any other domain. The
      view no longer does any redirects as they don't provide any known,
      useful functionality.

      Note, however, that this view has always carried a warning that it is
      not hardened for production use and should be used only as a development
      aid. Thanks Phithon Gong for reporting this issue. (Closes: #859516)

 -- Chris Lamb <lamby@debian.org>  Tue, 04 Apr 2017 17:53:30 +0200

python-django (1:1.10.6-1) unstable; urgency=medium

  * New upstream bugfix release:
    - Fixed ClearableFileInput’s “Clear” checkbox on model form fields where
      the model field has a default (#27805).
    - Fixed RequestDataTooBig and TooManyFieldsSent exceptions crashing rather
      than generating a bad request response (#27820).
    - Fixed a crash on Oracle and PostgreSQL when subtracting DurationField or
      IntegerField from DateField (#27828).
    - Fixed query expression date subtraction accuracy on PostgreSQL for
      differences larger than a month (#27856).
    - Fixed a GDALException raised by GDALClose on GDAL ≥ 2.0 (#27479).

 -- Chris Lamb <lamby@debian.org>  Wed, 01 Mar 2017 20:27:22 +0000

python-django (1:1.10.5-1) unstable; urgency=medium

  * New upstream bugfix release.
    <https://www.djangoproject.com/weblog/2017/jan/04/bugfix-release/>
    - Drop 0003-Fix-test-suite-in-parallel-mode.patch; applied upstream.

 -- Chris Lamb <lamby@debian.org>  Thu, 05 Jan 2017 09:34:42 +0000

python-django (1:1.10.3-2) unstable; urgency=medium

  * Add patch to fix tests running in parallel. Closes: #844139
  * Update copyright file (and drop new extra LICENSE.txt).
  * Adjust lintian overrides.

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 23 Nov 2016 10:45:50 +0100

python-django (1:1.10.3-1) unstable; urgency=medium

  * New upstream release. (Closes: #844037)

 -- Chris Lamb <lamby@debian.org>  Sat, 12 Nov 2016 11:52:50 +0000

python-django (1:1.10.1-1) unstable; urgency=medium

  * New upstream bugfix release.
    - Drop 07_fix-test-failures-due-to-translation-updates.diff; applied
      upstream.
  * Ensure that "django-admin startproject foo" using python3-django emits the
    corrent shebang (Closes: #833275)

 -- Chris Lamb <lamby@debian.org>  Fri, 02 Sep 2016 09:36:12 +0100

python-django (1:1.10-2) unstable; urgency=medium

  * Add patch from upstream to fix admin_utils test failures due to translation
    updates.

 -- Chris Lamb <lamby@debian.org>  Tue, 02 Aug 2016 00:09:22 -0400

python-django (1:1.10-1) unstable; urgency=medium

  * New upstream release.
  * Drop debian/source/lintian-overrides now that #799861 is fixed in Lintian.

 -- Chris Lamb <lamby@debian.org>  Mon, 01 Aug 2016 17:51:47 -0400

python-django (1:1.9.8-1) unstable; urgency=high

  * New upstream security release:
    https://www.djangoproject.com/weblog/2016/jul/18/security-releases/
    - CVE-2016-6186: XSS in admin's add/change related popup

 -- Luke Faraone <lfaraone@debian.org>  Tue, 19 Jul 2016 14:15:24 +0000

python-django (1:1.9.7-2) unstable; urgency=medium

  * Re-upload 1.9.7 to unstable with epoch.

 -- Chris Lamb <lamby@debian.org>  Sun, 26 Jun 2016 09:58:19 +0200

python-django (1.10~beta1-1) unstable; urgency=medium

  [ Chris Lamb ]
  * New upstream beta release.
  * Drop fix-25761-add-traceback-attribute.patch; applied upstream.

  [ Raphaël Hertzog ]
  * Remove obsolete /etc/bash_completion.d/django_bash_completion on upgrade.
    Closes: #801744

 -- Chris Lamb <lamby@debian.org>  Sat, 25 Jun 2016 19:17:49 +0200

python-django (1.9.7-1) unstable; urgency=medium

  [ Raphaël Hertzog ]
  * New upstream bugfix release.
  * Bump python-sphinx build dependency to >= 1.3. Closes: #824108
  * Drop build dependency on locales. C.UTF-8 that we currently use is part of
    libc-bin.

  [ Chris Lamb ]
  * Remove duplicated "of of" in python-django's README.Debian.

 -- Raphaël Hertzog <hertzog@debian.org>  Tue, 14 Jun 2016 00:05:22 +0200

python-django (1.9.6-1) unstable; urgency=medium

  * New upstream bugfix release.

 -- Chris Lamb <lamby@debian.org>  Sat, 07 May 2016 07:01:17 +0100

python-django (1.9.5-2) unstable; urgency=medium

  * Drop the dir_to_symlink transition that was only really needed
    for upgrades between versions 1.9~rc2 and 1.9.4. Closes: #821789

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 20 Apr 2016 17:47:05 +0200

python-django (1.9.5-1) unstable; urgency=medium

  * New upstream bugfix release:
    https://docs.djangoproject.com/en/1.9/releases/1.9.5/
  * Fix the DEP-8 test suite (django-admin --with python3 failing
    because ./manage.py does not have a good shebang).
  * Update Standards-Version to 3.9.8.
  * Add some lintian overrides.
  * Tweak Vcs-Browser to use https.
  * Drop obsolete parts of the copyright file.

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 06 Apr 2016 18:05:42 +0200

python-django (1.9.4-1) unstable; urgency=high

  [ Luke Faraone ]
  * New upstream security release:
    https://www.djangoproject.com/weblog/2016/mar/01/security-releases/ 
    - CVE-2016-2512: Malicious redirect and possible XSS via user-supplied
      redirect URLs containing basic auth
    - CVE-2016-2513: User enumeration through timing difference on password
      hasher work factor upgrade
      Closes: #816434

  [ Raphaël Hertzog ]
  * Fix rules file to no longer mess with *_templates directories. They no
    longer contain invalid .py files but only *-tpl template files that are
    instantiated at runtime.

 -- Luke Faraone <lfaraone@debian.org>  Mon, 07 Mar 2016 17:09:54 +0000

python-django (1.9.2-1) unstable; urgency=medium

  * New upstream security release fixing:
    - CVE-2016-2048: User with "change" but not "add" permission can create
      objects for ModelAdmin objects with save_as=True
      Closes: #813448

 -- Raphaël Hertzog <hertzog@debian.org>  Tue, 02 Feb 2016 09:06:46 +0100

python-django (1.9.1-1) unstable; urgency=medium

  * New upstream release.

 -- Chris Lamb <lamby@debian.org>  Mon, 04 Jan 2016 17:51:40 +0000

python-django (1.9-2) unstable; urgency=medium

  [ Chris Lamb ]
  * Use dpkg-maintscript-helper's dir_to_symlink to correctly replace the
    app_template and project_template symlinks added in 1.9~rc2-2.
    (Closes: #807683)

  [ Raphaël Hertzog ]
  * Add some DEP-8 tests testing "django-admin" and running the test suite
    against the installed package. In both cases, we do it with python2 and
    python3.
  * Add python-tblib and python3-tblib to Build-Depends for the benefit of
    the parallel testing feature of the test suite.
  * Add "set -e" in the command line running the tests with all supported
    versions so that it actually fails as soon as one version is failing
    (and thus disallow later successes to shadow earlier failures).

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 30 Dec 2015 16:44:04 +0100

python-django (1.9-1) unstable; urgency=medium

  * Upload to unstable
  * Adjust uversionmangle in debian/watch to mangle "1.9rc2" scheme
    (previously only "1.9-rc-2" would have matched).

 -- Chris Lamb <lamby@debian.org>  Thu, 03 Dec 2015 16:48:30 +0200

python-django (1.9~rc2-2) experimental; urgency=medium

  * Move {app,project}_template to python-django-common to prevent
    byte-compilation (via pycompile) on installation, causing failure. They are
    not valid Python files until variables have been interpolated.

 -- Chris Lamb <lamby@debian.org>  Thu, 26 Nov 2015 14:53:11 +0200

python-django (1.9~rc2-1) experimental; urgency=medium

  * New upstream release candidate.
  * Add myself to Uploaders.

 -- Chris Lamb <lamby@debian.org>  Thu, 26 Nov 2015 10:14:15 +0200

python-django (1.8.7-2) unstable; urgency=high

  * Rely on C.UTF-8 to run the tests instead of building our locale ourselves.
  * Add debian/patches/fix-25761-add-traceback-attribute.patch:
    new patch to ensure exceptions registered in __cause__ attributes
    have a __traceback__ attribute. Closes: #802677
  * Extend lintian overrides to cover more false positives of
    source-is-missing.
  * Cleanup debian/copyright for dropped/renamed files.
  * Run tests for all supported Python versions.

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 25 Nov 2015 16:16:10 +0100

python-django (1.8.7-1) unstable; urgency=high

  * New upstream security release:
    https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/
    It fixes:
    - CVE-2015-8213: settings leak possibility in date template filter

 -- Luke Faraone <lfaraone@debian.org>  Wed, 25 Nov 2015 04:24:27 +0000

python-django (1.8.6-1) unstable; urgency=medium

  * New upstream bugfix release.

 -- Raphaël Hertzog <hertzog@debian.org>  Sun, 15 Nov 2015 18:29:11 +0100

python-django (1.8.5-2) unstable; urgency=medium

  * Upload to unstable.

 -- Raphaël Hertzog <hertzog@debian.org>  Mon, 02 Nov 2015 15:56:10 +0100

python-django (1.8.5-1) experimental; urgency=medium

  * New upstream bugfix release:
    https://www.djangoproject.com/weblog/2015/oct/03/bugfix-release-issued/

 -- Raphaël Hertzog <hertzog@debian.org>  Tue, 13 Oct 2015 11:37:24 +0200

python-django (1.8.4-1) experimental; urgency=medium

  * New upstream security release:
    https://www.djangoproject.com/weblog/2015/aug/18/security-releases/
    It fixes:
    - CVE-2015-5964: possible denial-of-service in logout() view
  * Update debian/copyright to copyright-format 1.0.

 -- Luke Faraone <lfaraone@debian.org>  Wed, 19 Aug 2015 03:55:47 +0000

python-django (1.8.3-1) experimental; urgency=medium

  * New upstream security release:
    https://www.djangoproject.com/weblog/2015/jul/08/security-releases/
    It fixes:
    - CVE-2015-5143: possible denial-of-service by filling session store
    - CVE-2015-5144: possible header injection since validators accept
      newlines in input
    - CVE-2015-5145: possible denial-of-service in URL validation
  * Drop fix-assertRaisesMessage.patch and
    fix-test-extended-length-storage.patch which have been merged upstream.

 -- Raphaël Hertzog <hertzog@debian.org>  Thu, 09 Jul 2015 01:53:02 +0200

python-django (1.8.2-1) experimental; urgency=medium

  * New upstream security release:
    https://www.djangoproject.com/weblog/2015/may/20/security-release/
  * Install bash completion file into /usr/share/bash-completion/completions/

 -- Raphaël Hertzog <hertzog@debian.org>  Thu, 21 May 2015 15:59:36 +0200

python-django (1.8.1-1) experimental; urgency=medium

  * New major upstream release:
    https://docs.djangoproject.com/en/1.8/releases/1.8/
    https://docs.djangoproject.com/en/1.8/releases/1.8.1/
  * Refresh all patches.
  * Drop 03_manpage.diff, merged upstream.
  * Clean up rules since we can use the pristine docs directory, now
    that they refer to django-admin and not django-admin.py
  * Add jinja2 and mock as build dependencies required by the test
    suite.
  * Add fix-assertRaisesMessage.patch to make the package build with
    python 2.7.10~rc1 which is affected by
    https://bugs.python.org/issue24134
  * Add fix-test-extended-length-storage.patch to make the package build
    even when AUFS is in use (and when the max length of a filename is
    shorter than usual).

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 20 May 2015 09:54:47 +0200

python-django (1.7.10-1) unstable; urgency=medium

  * Fix Python 3.5 HTMLParseError issue. Closes: #800137.
  * New upstream version. Fixes CVE-2015-5963, CVE-2015-5964. Closes: #796104.
  * Add numpy 1.9 support. Closes: #801554.

 -- Brian May <bam@debian.org>  Mon, 12 Oct 2015 12:59:43 +1100

python-django (1.7.9-1) unstable; urgency=medium

  * New upstream security release:
    https://www.djangoproject.com/weblog/2015/jul/08/security-releases/
    It fixes:
    - CVE-2015-5143: possible denial-of-service by filling session store
    - CVE-2015-5144: possible header injection since validators accept
      newlines in input

 -- Raphaël Hertzog <hertzog@debian.org>  Thu, 09 Jul 2015 01:33:31 +0200

python-django (1.7.7-1) unstable; urgency=high

  * New upstream security and bugfix release:
    https://www.djangoproject.com/weblog/2015/mar/18/security-releases/
    It fixes:
    - CVE-2015-2317: possible XSS attack via user-supplied redirect URLs
      Closes: #780873
    - CVE-2015-2316: Denial-of-service possibility with strip_tags()
      Closes: #780874

 -- Raphaël Hertzog <hertzog@debian.org>  Mon, 23 Mar 2015 20:41:13 +0100

python-django (1.7.6-1) unstable; urgency=high

  * New upstream security release:
    https://www.djangoproject.com/weblog/2015/mar/09/security-releases/
  * Fixes CVE-2015-2241: XSS attack via properties in
    ModelAdmin.readonly_fields

 -- Raphaël Hertzog <hertzog@debian.org>  Mon, 09 Mar 2015 21:40:34 +0100

python-django (1.7.5-1) unstable; urgency=medium

  [ Chris Lamb ]
  * Remove myself from Uploaders.

  [ Raphaël Hertzog ]
  * New upstream bugfix release:
    https://docs.djangoproject.com/en/1.7/releases/1.7.5/

 -- Raphaël Hertzog <hertzog@debian.org>  Fri, 06 Mar 2015 21:13:54 +0100

python-django (1.7.4-1) unstable; urgency=medium

  * Release to unstable and hopefully to Jessie too.

 -- Raphaël Hertzog <hertzog@debian.org>  Mon, 09 Feb 2015 10:39:15 +0100

python-django (1.7.4-1~exp1) experimental; urgency=medium

  * New upstream bugfix release.
  * Drop fix-24193-python34-test-failure.diff, merged upstream.

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 28 Jan 2015 09:38:24 +0100

python-django (1.7.3-1~exp1) experimental; urgency=high

  [ Luke Faraone ]
  * New upstream security release.
    - WSGI header spoofing via underscore/dash conflation (CVE-2015-0219)
    - Possible XSS attack via user-supplied redirect URLs (CVE-2015-0220)
    - DoS attack against django.views.static.serve (CVE-2015-0221)
    - Database DoS with ModelMultipleChoiceField (CVE-2015-0222)
    Closes: #775375

  [ Raphaël Hertzog ]
  * Add patch fix-24193-python34-test-failure.diff to fix a test failure with
    Python3.4.

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 21 Jan 2015 09:56:19 +0100

python-django (1.7.2-1) experimental; urgency=medium

  [ Raphaël Hertzog ]
  * Add geoip-database-extra as an alternative to geoip-database-contrib.

  [ Brian May ]
  * New upstream version.

 -- Brian May <bam@debian.org>  Mon, 05 Jan 2015 13:57:16 +1100

python-django (1.7.1-1) unstable; urgency=medium

  [ Raphaël Hertzog ]
  * New upstream bugfix release.
  * Drop 01_fix_test_loaddata_not_existant_fixture_file.patch, merged
    upstream.
  * Update Standards-Version to 3.9.6.
  * Add lintian overrides for package-contains-timestamped-gzip (false
    positive).

  [ Brian May ]
  * Fix django-admin wrapper to not even consider using python 2.6 as
    that version is unsupported with Django 1.7.

 -- Raphaël Hertzog <hertzog@debian.org>  Mon, 27 Oct 2014 16:37:41 +0100

python-django (1.7-3) unstable; urgency=medium

  * Add 01_fix_test_loaddata_not_existant_fixture_file.patch
    to fix FTBFS with Python 3.4.2. Closes: #765117
  * Improve migrate-south script to look for Python files in the current dir.
    ./manage.py implicitely has the current directory but when we use
    django-admin it's not the case. Thanks to Uwe Kleine-Koenig for the
    report.

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 15 Oct 2014 10:45:27 +0200

python-django (1.7-2) unstable; urgency=medium

  * Release to unstable.
  * Add a migrate-south sample script to help users apply their South
    migrations. Thanks to Brian May.

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 17 Sep 2014 14:15:11 +0200

python-django (1.7-1) experimental; urgency=medium

  * New major upstream release.
  * Add a NEWS file to document the incompatibility with South.

 -- Raphaël Hertzog <hertzog@debian.org>  Mon, 08 Sep 2014 10:19:12 +0200

python-django (1.7~c3-1) experimental; urgency=medium

  * New upstream release candidate with security fixes:
    https://www.djangoproject.com/weblog/2014/aug/20/security/

 -- Raphaël Hertzog <hertzog@debian.org>  Fri, 22 Aug 2014 22:50:32 +0200

python-django (1.7~c2-2) experimental; urgency=medium

  * Merge changes from 1.6.5-4:
    * Don't output stuff to stdout in django-admin. Closes: #757145
    * Update Vcs-* fields since the packaging repository moved to git.

 -- Raphaël Hertzog <hertzog@debian.org>  Fri, 08 Aug 2014 14:26:47 +0200

python-django (1.7~c2-1) experimental; urgency=medium

  * New upstream release candidate.

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 30 Jul 2014 20:47:10 +0200

python-django (1.7~c1+20140722-2) experimental; urgency=medium

  * Move django-admin manual page in python-django-common. Bump version
    constraint in Breaks/Replaces accordingly.
  * Drop conflicting django-admin in python-django and python3-django that
    were not removed as usual because upstream stopped installing them as
    django-admin.py.
  * Drop extra license files.
  * Fix shebang lines in python3-django.
  * Drop empty left-over /usr/bin directories in python-django/python3-django.

 -- Raphaël Hertzog <hertzog@debian.org>  Tue, 22 Jul 2014 23:29:30 +0200

python-django (1.7~c1+20140722-1) experimental; urgency=medium

  * New upstream release candidate. We want this version in jessie so we
    should prepare now.
  * Snapshot tarball generated with "python setup.py sdist" after having
    applied fix submitted in https://code.djangoproject.com/ticket/23072
  * Added python-sqlparse, python-tz to Recommends
  * Added other optional dependencies (python-memcache, python-pil,
    python-bcrypt) to Suggests
  * Add all those dependencies in Build-Depends for the benefit of the
    test suite.
  * Run the test suite for python2 and python3.
  * Differentiate descriptions of python2 and python3 packages. 

 -- Raphaël Hertzog <hertzog@debian.org>  Mon, 21 Jul 2014 21:57:07 +0200

python-django (1.6.6-1) unstable; urgency=high

  * New upstream security release.
    - reverse() can generate URLs pointing to other hosts (CVE-2014-0480)
    - file upload denial of service (CVE-2014-0481)
    - RemoteUserMiddleware session hijacking (CVE-2014-0482)
    - data leakage via querystring manipulation in admin (CVE-2014-0483)

  [ Brian May ]
  * Don't output stuff to stdout in django-admin. Closes: #757145

  [ Raphaël Hertzog ]
  * Update Vcs-* fields since the packaging repository moved to git.

 -- Luke Faraone <lfaraone@debian.org>  Wed, 20 Aug 2014 19:30:21 -0700

python-django (1.6.5-3) unstable; urgency=low

  * Replace django-admin with script that can be run as python and shell.

    This means we can autodetect which python version to use when run as
    shell, while maintaining compatability with processes that try to run it
    with a specific python version.

    e.g. See bugs #755341 and #755321.

 -- Brian May <bam@debian.org>  Mon, 21 Jul 2014 10:18:39 +1000

python-django (1.6.5-2) unstable; urgency=low

  * python3-django package. Closes: #736878.

 -- Brian May <bam@debian.org>  Tue, 24 Jun 2014 10:51:47 +1000

python-django (1.6.5-1) unstable; urgency=high

  * New upstream security release.
   - Caches may be allowed to store and serve private data (CVE-2014-1418)
   - Malformed URLs from user input incorrectly validated
  * Drop partial_functions_reverse.patch (merged upstream).

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 14 May 2014 22:49:59 +0200

python-django (1.6.3-2) unstable; urgency=high

  * Fix regression of reverse() and partial views. (LP: #1311433)
    Thanks Preston Timmons.

 -- Luke Faraone <lfaraone@debian.org>  Tue, 22 Apr 2014 20:44:18 -0700

python-django (1.6.3-1) unstable; urgency=high

  * New upstream security release.
    - Unexpected code execution using ``reverse()``
    - CVE-2014-0472
    - Caching of anonymous pages could reveal CSRF token
    - CVE-2014-0473
    - MySQL typecasting could result in unexpected matches
    - CVE-2014-0474
  * Drop patches 07_translation_encoding_fix and ticket21869.diff; merged
    upstream

 -- Luke Faraone <lfaraone@debian.org>  Mon, 21 Apr 2014 16:47:14 -0700

python-django (1.6.1-2) unstable; urgency=medium

  * Team upload.
  * d/patches/ticket21869.diff: Cherry pick upstream fix for building 
    documentation against Sphinx 1.2.1.

 -- Barry Warsaw <barry@debian.org>  Wed, 29 Jan 2014 18:37:51 +0000

python-django (1.6.1-1) unstable; urgency=medium

  * New upstream version.
  * Fix broken encoding in translations attribution. (Closes: #729194)

 -- Luke Faraone <lfaraone@debian.org>  Thu, 12 Dec 2013 15:46:01 -0500

python-django (1.6-1) unstable; urgency=low

  * New upstream version. Closes: #557474, #724637.
  * python-django now also suggests the installation of ipython,
    bpython, python-django-doc, and libgdal1.
    Closes: #636511, #686333, #704203
  * Set package maintainer to Debian Python Modules Team.
  * Bump standards version to 3.9.5, no changes needed.

 -- Luke Faraone <lfaraone@debian.org>  Thu, 07 Nov 2013 15:33:49 -0500

python-django (1.5.4-1) unstable; urgency=high

  * New upstream security release. Fixes CVE-2013-1443. Closes: #723043.
    https://www.djangoproject.com/weblog/2013/sep/15/security/
    - Denial-of-service via large passwords. CVE-2013-1443

 -- Luke Faraone <lfaraone@debian.org>  Sun, 15 Sep 2013 15:50:10 -0400

python-django (1.5.3-1) unstable; urgency=high

  * New upstream security release. Fixes CVE-2013-4315. Closes: #722605
    https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/
    - Directory traversal with ssi template tag
  * Update doc-base file to drop some removed directory in the HTML doc.
  * Update Standards-Version to 3.9.4.
  * Bump debhelper compat level to 9.

 -- Raphaël Hertzog <hertzog@debian.org>  Fri, 13 Sep 2013 00:05:19 +0200

python-django (1.5.2-1) unstable; urgency=high

  * New upstream security release.
    https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/
    - Cross-site scripting (XSS) in admin interface
    - Possible XSS via is_safe_url

 -- Luke Faraone <lfaraone@debian.org>  Tue, 13 Aug 2013 16:49:39 -0400

python-django (1.5.1-2) unstable; urgency=low

  [ Jakub Wilk ]
  * Use canonical URIs for Vcs-* fields.

  [ Luke Faraone ]
  * Upload to unstable.

 -- Luke Faraone <lfaraone@debian.org>  Thu, 09 May 2013 15:10:47 -0400

python-django (1.5.1-1) experimental; urgency=low

  * New upstream release.
  * Add self to uploaders field.

 -- Luke Faraone <lfaraone@debian.org>  Thu, 28 Mar 2013 17:17:10 -0400

python-django (1.5-1) experimental; urgency=low

  * New upstream release. Closes: #646634, #663230, #436983

 -- Luke Faraone <lfaraone@debian.org>  Fri, 22 Mar 2013 17:52:30 -0400

python-django (1.4.5-1) unstable; urgency=high

  * New upstream maintenance release dropping some undesired .pyc files
    and fixing a documentation link.
  * High urgency due to former security updates.

 -- Raphaël Hertzog <hertzog@debian.org>  Sun, 24 Feb 2013 10:28:08 +0100

python-django (1.4.4-1) unstable; urgency=low

  * New upstream security and maintenance release. Closes: #701186 
    https://www.djangoproject.com/weblog/2013/feb/19/security/
    Fixes mulptiple security issues:
    - Further fixes for Host header poisoning. CVE-2012-4520
    - XML attacks via entity expansion. CVE-2013-1665
    - Data leakage via admin history log. CVE-2013-0305
    - Formset denial-of-service. CVE-2013-0306
  * Add gettext to Suggests since it's required for django-admin
    compilemessages / makemessages. Closes: #700483

 -- Raphaël Hertzog <hertzog@debian.org>  Sat, 23 Feb 2013 09:33:13 +0100

python-django (1.4.3-1) unstable; urgency=high

  * New upstream security and maintenance release. Closes: #696535
    https://www.djangoproject.com/weblog/2012/dec/10/security/
  * Drop debian/patches/01_fix-self-tests.diff, merged upstream.

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 26 Dec 2012 15:49:32 +0100

python-django (1.4.2-2) unstable; urgency=low

  * Don't fail self-tests if MANAGERS or ADMINS is defined in settings.py.
    Add upstream patch debian/patches/01_fix-self-tests.diff.
    Thanks to Jamie Strandboge <jamie@ubuntu.com> for the report.
    Closes: #693752 LP: #1080204

 -- Raphaël Hertzog <hertzog@debian.org>  Tue, 20 Nov 2012 08:28:37 +0100

python-django (1.4.2-1) unstable; urgency=high

  * New upstream security and maintenance release. Closes: #691145
    Fixes: CVE-2012-4520
  * Drop 01_use_stdlib_htmlparser_when_possible.diff which has been
    merged upstream.

 -- Raphaël Hertzog <hertzog@debian.org>  Mon, 22 Oct 2012 10:53:30 +0200

python-django (1.4.1-2) unstable; urgency=low

  * New patch 01_use_stdlib_htmlparser_when_possible.diff to not override
    Python stdlib's HTMLParser with Python versions which are unaffected by
    http://bugs.python.org/issue670664 Closes: #683648
    Thanks to David Watson <david@planetwatson.co.uk> for the patch.
  * Update the above patch to use the version committed upstream (commit
    57d9ccc).

 -- Raphaël Hertzog <hertzog@debian.org>  Tue, 21 Aug 2012 08:42:10 +0200

python-django (1.4.1-1) unstable; urgency=low

  * New upstream security and maintenance release. Closes: #683364
    Fixes: CVE-2012-3442 CVE-2012-3443 CVE-2012-3444
  * Drop 01_disable_broken_test.diff and 04_hyphen-manpage.diff which
    have been merged upstream.

 -- Raphaël Hertzog <hertzog@debian.org>  Thu, 02 Aug 2012 10:44:02 +0200

python-django (1.4-1) unstable; urgency=low

  * New upstream release. Closes: #666003
  * Fix watch file to correctly extract the version number from the URL.
  * Updated Standards-Version to 3.9.3 (no change needed).
  * Drop 01_disable_url_verify_regression_tests.diff since upstream test
    suite has been modified to work even without internet connection.
  * Update 04_hyphen-manpage.diff to apply again.
  * Drop 05_fix_djangodocs_sphinx_ext.diff which has been merged
    upstream.
  * Update 06_use_debian_geoip_database_as_default.diff to apply on
    renamed file.
  * Drop 07_fix_for_sphinx1.1.2.diff merged upstream.
  * Drop 08_fix_test_week_view_allow_future.diff, merged upstream.
  * Add 01_disable_broken_test.diff to disable a test that fails with
    the current python 2.7 version in Debian.

 -- Raphaël Hertzog <hertzog@debian.org>  Sat, 31 Mar 2012 14:48:00 +0200

python-django (1.3.1-4) unstable; urgency=medium

  * Add 08_fix_test_week_view_allow_future.diff to fix a regression test that
    only worked in 2011. Closes: #655666

 -- Raphaël Hertzog <hertzog@debian.org>  Tue, 17 Jan 2012 08:55:58 +0100

python-django (1.3.1-3) unstable; urgency=low

  * Add 06_use_debian_geoip_database_as_default.diff to use the default
    location of the GeoIP database used by the Debian package
    geoip-database-contrib. Closes: #645094
    Add this package to suggests. Thanks to Tapio Rantala
    <tapio.rantala@iki.fi> for the patch.
  * Bump build-dep on python-sphinx to 1.0.8 to ensure we have a version
    where #641710 is fixed. Closes: #647134
  * Add 07_fix_for_sphinx1.1.2.diff to fix build with Sphinx 1.1.2. Thanks to
    Jakub Wilk for the advance warning. Closes: #649624

 -- Raphaël Hertzog <hertzog@debian.org>  Mon, 28 Nov 2011 09:03:13 +0100

python-django (1.3.1-2) unstable; urgency=low

  * Update Build-Depends on locales to included a version requirement
    so that locales-all cannot satisfy it with its Provides: locales.
    Thanks to Jakub Wilk for the suggestion.
  * Enable 02_disable-sources-in-sphinxdoc.diff since #641710 has been
    fixed.
  * Add 05_fix_djangodocs_sphinx_ext.diff to support Sphinx 1.0.8.
    Closes: #643758

 -- Raphaël Hertzog <hertzog@debian.org>  Wed, 12 Oct 2011 08:45:26 +0200

python-django (1.3.1-1) unstable; urgency=low

  * New upstream release. It includes security updates described here:
    https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/
    Closes: #641405
  * Update 01_disable_url_verify_regression_tests.diff and merge
    07_disable_url_verify_model_tests.diff into it.
  * Update patch headers to conform to DEP-3.
  * Apply patch from Steve Langasek to dynamically build the UTF-8
    locale required by the test-suite instead of build-depending on
    locales-all. Closes: #630421
  * Use "dh --with sphinxdoc" to clean up the Sphinx generated documentation
    and avoid the embedded-javascript-library lintian warning. Build-Depends
    on python-sphinx >= 1.0.7+dfsg-1 for this and also add
    ${sphinxdoc:Depends} to python-django-doc Depends field.
  * Cleanup build-dependencies now that even oldstable has python 2.5.
  * Switch to dh_python2 as python helper tool. Drop legacy files
    debian/pyversions and debian/pycompat.
  * New patch 02_disable-sources-in-sphinxdoc.diff to not generate
    the _sources directory that we used to remove manually within the rules
    file. But must be kept disabled until #641710 is fixed.
  * Properly support DEB_BUILD_OPTIONS=nocheck despite the override
    of dh_auto_test.

 -- Raphaël Hertzog <hertzog@debian.org>  Thu, 15 Sep 2011 12:43:51 +0200

python-django (1.3-2) unstable; urgency=low

  * Team upload.

  [ Chris Lamb ]
  * Don't remove "backup~" test file - upstream did ship it; we were just
    removing it with dh_clean.

  [ Piotr Ożarowski ]
  * Fix builds with non-default Python versions installed
  * Bump Standards-Version to 3.9.2 (no changes needed)

 -- Piotr Ożarowski <piotr@debian.org>  Mon, 02 May 2011 22:23:37 +0200

python-django (1.3-1) unstable; urgency=low

  * New upstream release.
    - Update 01_disable_url_verify_regression_tests.diff.
    - Update 07_disable_url_verify_model_tests.diff.
    - Merge patch from Krzysztof Klimonda to disable more network access tests.
      (Closes: #598674)
  * Add workaround for missing "backup~" file in release tarball. See
    <http://code.djangoproject.com/ticket/15677>.

 -- Chris Lamb <lamby@debian.org>  Thu, 24 Mar 2011 15:04:53 +0000

python-django (1.2.5-1) unstable; urgency=low

  * New upstream release.
  * Do not compress objects.inv used by Sphinx generated documentation.
    Thanks to Michael Fladischer for the report. Closes: #608769 

 -- Raphaël Hertzog <hertzog@debian.org>  Sat, 12 Feb 2011 08:59:33 +0100

python-django (1.2.4-1) unstable; urgency=high

  * New bugfix-only upstream release. It includes security fixes.
    http://www.djangoproject.com/weblog/2010/dec/22/security/
  * Drop patches merged upstream:
    - debian/patches/05_fix_regression_tests.diff
    - debian/patches/06_fix_regression_tests.diff
  * Update 01_disable_url_verify_regression_tests.diff to cope with the
    updated regressions tests.
  * Update 03_manpage.diff and 04_hyphen-manpage.diff to cope with changes in
    the manual page.

 -- Raphaël Hertzog <hertzog@debian.org>  Fri, 31 Dec 2010 11:40:28 +0100

python-django (1.2.3-2) unstable; urgency=low

  * Team upload.
  * Disable model tests that require an internet connection.
    Closes: #601070
  * Include python.mk conditionally as explained in its header.
    Helps backports to Lenny which has no python.mk.
    Closes: #601608

 -- Evgeni Golov <evgeni@debian.org>  Thu, 28 Oct 2010 12:37:15 +0200

python-django (1.2.3-1) unstable; urgency=low

  [ Krzysztof Klimonda ]
  * New upstream release. Closes: #596893 LP: #636482
  * Fixes both a XSS vulnerability introduced in 1.2 series and
    the regressions caused by 1.2.2 release. Closes: #596205
  * debian/control:
    - depend on language packs for en_US.utf8 locales required for unit tests.
  * debian/rules:
    - re-enable build time tests.
    - set LC_ALL to en_US.utf8 for test suite.
  * debian/patches/series:
    - two new patches: 05_fix_regression_tests.diff and
      06_fix_regression_tests.diff backported from 1.2.x branch to fix
      test suite failures.

  [ Raphaël Hertzog ]
  * Update Standards-Version to 3.9.1.
  * Drop "--with quilt" and quilt build-dependency since the package is
    already using source format "3.0 (quilt)".

 -- Raphaël Hertzog <hertzog@debian.org>  Sat, 18 Sep 2010 19:37:03 +0200

python-django (1.2.1-1) unstable; urgency=low

  * New upstream bugfix release.

 -- Chris Lamb <lamby@debian.org>  Mon, 24 May 2010 22:44:32 +0100

python-django (1.2-1) unstable; urgency=low

  * New upstream stable release.

 -- Chris Lamb <lamby@debian.org>  Fri, 21 May 2010 07:52:55 +0100

python-django (1.2~rc1-1) experimental; urgency=low

  * New upstream release candidate.
  * Remove "02-embedded_code_copies.diff" - not needed anymore.
  * Refresh "01_disable_url_verify_regression_tests.diff".
  * Refresh "04_hyphen-manpage.diff".
  * Temporarily disable test runner due to failing date-related tests.

 -- Chris Lamb <lamby@debian.org>  Thu, 06 May 2010 10:25:10 +0100

python-django (1.2~beta1-1) experimental; urgency=low

  * New upstream development release.
  * Switch to dpkg-source 3.0 (quilt) format
  * Bump Standards-Version to 3.8.4.
  * Remove "0.96 -> 1.x" NEWS entry.
  * jQuery added to admin system upstream:
    - Add libjs-jquery to python-django's Recommends
    - Use symlinks so we use the version from libjs-query over an embedded code
      copy.

 -- Chris Lamb <lamby@debian.org>  Tue, 09 Feb 2010 13:47:34 +0000

python-django (1.2~alpha1-1) experimental; urgency=low

  * New upstream development release:

     This is the first in a series of preview/development releases leading up
     to the eventual release of Django 1.2, currently scheduled to take place
     in March 2010. 

     <http://docs.djangoproject.com/en/dev//releases/1.2-alpha-1/>

  * Update "01_disable_url_verify_regression_tests.diff" - tests now use the
    unittest module instead of doctests.
  * Update "02-embedded_code_copies.diff".
  * Remove "05_ftbfs_in_november.diff" - applied upstream.
  * Remove "06_python_2.6.3_regression.diff" - applied upstream.
  * Update dh_auto_test - database engine is set differently in 1.2.
  * Remove useless ._DS_Store files.

 -- Chris Lamb <lamby@debian.org>  Wed, 06 Jan 2010 14:34:37 +0000

python-django (1.1.1-2) unstable; urgency=low

  * Remove embedded "decimal" code copy and use system version instead. The
    "doctest" code copy cannot be removed as parts of Django depend on modified
    behaviour. (Closes: #555419)
  * Fix FTBFS in November by applying patch from upstream bug #12125.
    (Closes: #555931)
  * Fix FTBFS under Python 2.6.3 by applying patch from upstream bug #11993.
    (Closes: #555969)

 -- Chris Lamb <lamby@debian.org>  Tue, 01 Dec 2009 23:46:22 +0000

python-django (1.1.1-1) unstable; urgency=high

  * New upstream security release - fixes pathological regular expression
    backtracking performance in URL and email fields which can be used as part
    of a denial of service attack.
  * Set Maintainer: to myself with thanks to Brett Parker.
  * Bump versioned build dependency on quilt to help backporters.
    (Closes: #547955)

 -- Chris Lamb <lamby@debian.org>  Sat, 10 Oct 2009 10:17:52 +0100

python-django (1.1-4) unstable; urgency=low

  * Sourceful upload to drop dependency on Python 2.4.

 -- Chris Lamb <lamby@debian.org>  Mon, 24 Aug 2009 08:16:11 +0100

python-django (1.1-3) unstable; urgency=low

  * Disable regression tests that require an internet connection. Patch by
    Krzysztof Klimonda <kklimonda@syntaxhighlighted.com>. (Closes: #542996)
  * Bump Standards-Version to 3.8.3.

 -- Chris Lamb <lamby@debian.org>  Sun, 23 Aug 2009 18:13:18 +0100

python-django (1.1-2) unstable; urgency=low

  * Run testsuite on build.
  * Use "--with quilt" over specifying $(QUILT_STAMPFN)/unpatch dependencies.
  * Override clean target correctly.

 -- Chris Lamb <lamby@debian.org>  Fri, 14 Aug 2009 08:06:29 +0100

python-django (1.1-1) unstable; urgency=low

  * New upstream release.
  * Merge from experimental:
    - Ship FastCGI initscript and /etc/default file in python-django's examples
      directory (Closes: #538863)
    - Drop "05_10539-sphinx06-compatibility.diff"; it has been applied
      upstream.
    - Bump Standards-Version to 3.8.2.

 -- Chris Lamb <lamby@debian.org>  Wed, 29 Jul 2009 11:26:28 +0200

python-django (1.0.2-7) unstable; urgency=low

  * Fix compatibility with Python 2.6 and Python transitions in general.
    Thanks to Krzysztof Klimonda <kklimonda@syntaxhighlighted.com>.

 -- Chris Lamb <lamby@debian.org>  Sat, 16 May 2009 00:09:47 +0100

python-django (1.0.2-6) unstable; urgency=low

  * Backport patch from <http://code.djangoproject.com/ticket/10539> to fix
    FTBFS when using python-sphinx >= 0.6. (Closes: #527492)

 -- Chris Lamb <lamby@debian.org>  Sun, 10 May 2009 22:11:09 +0100

python-django (1.0.2-5) unstable; urgency=low

  * Fix issue where newly created projects do not have their manage.py file
    executable.

 -- Chris Lamb <lamby@debian.org>  Thu, 26 Mar 2009 23:42:14 +0000

python-django (1.0.2-4) unstable; urgency=low

  * Programatically replace most references to "django-admin.py" with
    "django-admin" in the generated documentation. (Closes: #519937)
  * Bump Standards-Version to 3.8.1; no changes.

 -- Chris Lamb <lamby@debian.org>  Tue, 24 Mar 2009 00:50:26 +0000

python-django (1.0.2-3) unstable; urgency=low

  * Split documentation into a separate python-django-doc package due to size
    (approximately 6Mb).

 -- Chris Lamb <lamby@debian.org>  Tue, 10 Mar 2009 21:13:57 +0000

python-django (1.0.2-2) unstable; urgency=low

  * Don't rely on the internal layout of python-support. (Closes: #517052)
  * Move to debhelper-based packaging for operational clarity:
    - Remove bashisms from binary-post-install.
    - Use quilt instead of simple-patchsys.mk and adjust existing patches so
      that we can apply with -p1 for the "quilt" source package type.
  * Adjust Build-Depends:
    - Bump debhelper requirement 7.0.50 for override_* feature.
    - Drop cdbs, python-dev and python-setuptools requirement.
    - Just Build-Depend on `python', not `python-dev'.
    - Drop versions on Build-Depends where they are satisfied in current
      oldstable (ie. etch).
  * debian/control:
    - Add python-sqlite to Suggests.
    - Remove repeated 'Priority' line in binary package stanza.
    - Update crufty long and short descriptions.
    - Add ${misc:Depends} in binary stanza for debhelper-using package.

 -- Chris Lamb <lamby@debian.org>  Sun, 08 Mar 2009 06:01:59 +0000

python-django (1.0.2-1) unstable; urgency=low

  [ Chris Lamb ]
  * New upstream bugfix release. Closes: #505783
  * Add myself to Uploaders with ACK from Brett.

  [ David Spreen ]
  * Remove python-pysqlite2 from Recommends because Python 2.5 includes
    sqlite library used by Django. Closes: 497886

  [ Sandro Tosi ]
  * debian/control
    - switch Vcs-Browser field to viewsvn

 -- Chris Lamb <lamby@debian.org>  Wed, 19 Nov 2008 21:31:00 +0000

python-django (1.0-1) unstable; urgency=low

  [ David Spreen ]
  * New _stable_ upstream release.

  [ Raphael Hertzog ]
  * This version fixes the latest security issue:
    http://www.djangoproject.com/weblog/2008/sep/02/security/
    Closes: #497765
  * Don't include source files of documentation in the binary package,
    keep only the HTML version.
  * Updated README.Debian with information about the switch from 0.96 to
    1.0.
  * Remove execute right on /etc/bash_completion.d/django_bash_completion
  * Add debian/patches/04_hyphen-manpage.diff to fix a lintian message
    (hyphen-used-as-minus-sign usr/share/man/man1/django-admin.1.gz:156).
  * Don't compress javascript files.
  * Add libjs-jquery to Recommends since it's used by the HTML
    documentation.

 -- Raphael Hertzog <hertzog@debian.org>  Thu, 04 Sep 2008 08:33:32 +0200

python-django (1.0~beta2+ds-1) unstable; urgency=low

  * Bumping up upstream version to push sources into unstable.
    (Thanks to Raphael Hertzog).

 -- David Spreen <netzwurm@debian.org>  Sat, 30 Aug 2008 20:56:09 -0700

python-django (1.0~beta2-3) unstable; urgency=low

  [ David Spreen ]
  * Updated the copyright information to include copyright and 
    licenses for individual contributions. 
  * Added the documentation to the main python-django package:
  * debian/python-django.install
    - Added installation of html documentation.
  * debian/python-django.doc-base
    - Added.
  * debian/control
    - Added Build-Depends-Indep on python-sphinx and libjs-jquery.
  * debian/rules
    - Readded code to build documentation.
    - Readded code to link to libjs-jquery.
  * debian/NEWS
    - Fixed format.
    - Added more comprehensive list of changes and references to 
      local documentation as well as the wiki pages for 
      backwards-incompatible changes.
  * debian/python-django.docs
    - Removed docs/*.txt since those are templates for the 
      generated docs now included with doc-base.
  
 -- David Spreen <netzwurm@debian.org>  Fri, 29 Aug 2008 09:20:45 -0700

python-django (1.0~beta2-2) unstable; urgency=low

  [ David Spreen ]
  * Removed all -doc related files temporarily to push beta2 into 
    unstable for extensive testing. The -doc package will be 
    readded once this package is in unstable as recommended in
    http://lists.debian.org/debian-release/2008/08/msg01475.html.
  * debian/python-django-doc.install
    - Removed.
  * debian/python-django-doc.doc-base
    - Removed.
  * debian/python-django-doc.examples
    - Moved to python-django.examples.
  * debian/rules
    - Removed python-doc related build and post-installation.
  * debian/control
    - Removed binary package python-django-doc.
    - Removed Build-Depends-Indep on python-sphinx and libjs-jquery.
  * debian/python-django.install:
    - Removed multiple package related issues.

 -- David Spreen <netzwurm@debian.org>  Thu, 28 Aug 2008 20:15:21 -0700

python-django (1.0~beta2-1) experimental; urgency=low

  [ David Spreen ]
  * The `hooray for the documentation' release!
  * New upstream beta release. 
  * debian/control 
    - Updated standards version.
    - Added python-sphinx and libjs-jquery.
    - Added python-django-doc package depending on libjs-jquery.
  * debian/docs
    - Moved to debian/python-django.docs.
  * debian/install
    - Moved to debian/python-django.install.
  * debian/manpages
    - Moved to debian/python-django.manpages.
  * debian/examples
    - Moved to debian/python-django-doc.examples
  * debian/README.Debian
    - Moved to debian/python-django.README.Debian
  * debian/python-django-doc.doc-base:
    - Added doc-base file for the documentation.
  * debian/python-django-doc.install:
    - Added install file for sphinx generated documentation.
  * debian/rules:
    - Added code to generate documentation with sphinx and 
      replace convenience file of jquery.js with the respective
      symlink to libjs-jquery.
  
 -- David Spreen <netzwurm@debian.org>  Thu, 28 Aug 2008 10:22:29 -0700

python-django (1.0~beta1-1) experimental; urgency=low

  [ David Spreen ]
  * New upstream beta release. Closes: #492956
  * debian/control: Added myself to Uploaders field.
  * debian/watch: Added mangling for filename and version. Old watch file would 
    name the download 'tarball'. Also added mangling to handle alpha and beta 
    versioning.
  * Drop debian/patches/01_add_shebang.diff as this has been fixed upstream.
  * Drop debian/patches/02_bash_completion.diff as this has been committed
    upstream http://code.djangoproject.com/ticket/7268.
  * debian/control: Added python-flup to the Suggest field. Closes: #488123
  * debian/patches/03_manpage.diff: Adapted patch to new upstream version.
  
  [ Jan Dittberner ]
  * add debian/watch file.
  
 -- David Spreen <netzwurm@debian.org>  Fri, 15 Aug 2008 16:05:07 -0700

python-django (0.97~svn7534-1) experimental; urgency=low

  * New upstream snapshot. Closes: #409565, #481051
    - Include an XSS security fix (CVE-2008-2302). Closes: #481164
  * Drop debian/patches/04_pg_version_fix.diff as another fix
    has been committed upstream (see http://code.djangoproject.com/ticket/6433
    and http://code.djangoproject.com/changeset/7415).
  * Add some headers to the remaining patches.

 -- Raphael Hertzog <hertzog@debian.org>  Mon, 19 May 2008 23:41:50 +0200

python-django (0.97~svn7189-1) experimental; urgency=low

  * New upstream snapshot including bash completion fix
    Closes: #450913

 -- Brett Parker <iDunno@sommitrealweird.co.uk>  Sun, 02 Mar 2008 12:59:03 +0000

python-django (0.97~svn7047-2) experimental; urgency=low

  [ Brett Parker ]
  * Patch for postgresql version issue with 8.3 beta/rc releases
    Closes: #462058

  [ Raphael Hertzog ]
  * Updated Standards-Version to 3.7.3.
  * Adjusted build-dependency on python-setuptools to strip the -1 part.

 -- Brett Parker <iDunno@sommitrealweird.co.uk>  Wed,  6 Feb 2008 15:15:37 +0000

python-django (0.97~svn7047-1) experimental; urgency=low

  * New upstream snapshot (rev 7047)
  - tarball prepared by Gabriel Falcão Gonçalves de Moura
    <gabriel@guake-terminal.org>

 -- Gustavo Noronha Silva <kov@debian.org>  Tue, 29 Jan 2008 10:54:47 -0200

python-django (0.97~svn6996-1) experimental; urgency=low

  * New upstream snapshot
  * debian/control:
  - added myself to Uploaders

 -- Gustavo Noronha Silva <kov@debian.org>  Sat, 05 Jan 2008 20:53:23 -0200

python-django (0.97~svn6668-2) UNRELEASED; urgency=low

  [ Raphael Hertzog ]
  * Install examples with dh_installexamples instead of dh_installdocs
    (change done by Ubuntu) as empty files are kept.

  [ Sandro Tosi ]
  * debian/control
    - uniforming Vcs-Browser field

 -- Raphael Hertzog <hertzog@debian.org>  Mon, 17 Dec 2007 09:09:16 +0100

python-django (0.97~svn6668-1) experimental; urgency=low

  * New SVN snapshot (rev 6668)
    - Auth system delegations
    - Apps can now have thier own management commands
    - Fix for CVE-2007-5712 remote denial of service
      Closes: #448838
  * Fix missing upstream info in changelog
    Closes: #450659

 -- Brett Parker <iDunno@sommitrealweird.co.uk>  Sun, 11 Nov 2007 10:15:55 +0000

python-django (0.96+svn6373-1) experimental; urgency=low

  [ Raphael Hertzog ]
  * New SVN snapshot (rev 6373, a few days after the last Django sprint).
  * Note: The version 0.96+svn6034-1 never got uploaded.
  * Rename XS-Vcs* fields to Vcs-* since they are now supported by dpkg.

  [ Piotr Ożarowski ]
  * XS-Vcs-Browser and Homepage fields added

 -- Raphael Hertzog <hertzog@debian.org>  Thu, 04 Oct 2007 14:59:01 +0200

python-django (0.96+svn6034-1) experimental; urgency=low

  [ Brett Parker]
  * New SVN snapshot (rev 6034).
     * validate and runserver commands now display the number of errors
       (returning back to previous functionality).
     * Small documentation fixes
     * assertRedirects handling for paths with get data
     * start{project,app} no make sure files created are writable
  * Add man page for django-admin to the debian package

 -- Brett Parker <iDunno@sommitrealweird.co.uk>  Sat,  8 Sep 2007 10:37:00 +0100

python-django (0.96+svn6020-1) experimental; urgency=low

  * New SVN snapshot (rev 6020).

 -- Raphael Hertzog <hertzog@debian.org>  Sun, 26 Aug 2007 18:16:08 +0200

python-django (0.96+svn5779-1) experimental; urgency=low

  * SVN snapshot (rev 5779) packaged to experimental as many interesting
    Django applications rely on newer unreleased features.

 -- Raphael Hertzog <hertzog@debian.org>  Tue, 31 Jul 2007 13:40:18 +0200

python-django (0.96-1) unstable; urgency=low

  [ Brett Parker ]
  * New upstream release - introduces some backwards incompatible changes, see
    README.Debian or the backwards incompatible changes page at
    http://code.djangoproject.com/wiki/BackwardsIncompatibleChanges
  * Add documentation from upstream to /usr/share/doc/python-django
    Closes: #411249
  * Install the bash completion file from extras in to
    /etc/bash_completion.d/django_bash_completion
    Closes: #414399
  * Egg support dropped as it's been dropped by upstream.

 -- Brett Parker <iDunno@sommitrealweird.co.uk>  Sun, 25 Mar 2007 19:18:39 +0100

python-django (0.95.1-1) unstable; urgency=low

  [ Brett Parker ]
  * New upstream minor release for security bugs:
    - http://www.djangoproject.com/weblog/2007/jan/21/0951/
      - Fixes a small security vulnerability in the script Django's
        internationalization system uses to compile translation files
        (changeset 4360 in the "0.95-bugfixes" branch).
      - fix for a bug in Django's authentication middleware which could cause
        apparent "caching" of a logged-in user (changeset 4361).
      - patch which disables debugging mode in the flup FastCGI package Django
        uses to launch its FastCGI server, which prevents tracebacks from
        bubbling up during production use (changeset 4363).
    Closes: #407786, #407607
  * Sets Recommends to python-psycopg and moves other database engines to
    the Suggests field.

  [ Raphael Hertzog ]
  * Use python-pysqlite2 as default database engine in Recommends. Others are
    in Suggests. Closes: #403761
  * Add python-psycopg2 in Suggests. Closes: #407489

 -- Raphael Hertzog <hertzog@debian.org>  Sun, 21 Jan 2007 17:45:50 +0100

python-django (0.95-3) unstable; urgency=low

  * Integrate 2 upstream changesets:
    - http://code.djangoproject.com/changeset/3754 as
      debian/patches/04_sec_fix_auth.diff
      Fixes a possible case of mis-authentication due to bad caching.
      Closes: #407521
    - http://code.djangoproject.com/changeset/3592 as
      debian/patches/03_sec_fix_compile-messages.diff
      Fixes an (unlikely) arbitrary command execution if the user is blindly
      running compile-messages.py on a untrusted set of *.po files.
      Closes: #407519

 -- Raphael Hertzog <hertzog@debian.org>  Sat, 16 Dec 2006 15:13:29 +0100

python-django (0.95-2) unstable; urgency=low

  [ Piotr Ozarowski ]
  * Added XS-Vcs-Svn field

  [ Brett Parker ]
  * Made manage.py get a shebang with the version of python
    used when running django-admin (closes: #401616)
  * Created a convenience /usr/lib/python-django/bin symlink.

  [ Raphael Hertzog ]
  * Adapted Brett's work to better fit my views of the packaging.

 -- Raphael Hertzog <hertzog@debian.org>  Sat, 16 Dec 2006 11:03:20 +0100

python-django (0.95-1) unstable; urgency=low

  [ Brett Parker ]
  * 0.95 release - initial packaging

  [ Raphael Hertzog ]
  * Fix recommends: s/python-sqlite/python-pysqlite2/
  * Add debian/pyversions to ensure that we have at least python 2.3 (and to
    work around bug #391689 of python-support).

 -- Raphael Hertzog <hertzog@debian.org>  Mon,  9 Oct 2006 12:10:27 +0200
