Skip to content
/ django Public
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: django/django
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 5.2.10
Choose a base ref
...
head repository: django/django
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 5.2.11
Choose a head ref
  • 13 commits
  • 22 files changed
  • 4 contributors

Commits on Jan 6, 2026

  1. Configuration menu
    Copy the full SHA
    6bc4e1c View commit details
    Browse the repository at this point in the history
  2. [5.2.x] Added stub release notes for 5.2.11.

    Backport of e937be3 from main.
    jacobtylerwalls committed Jan 6, 2026
    Configuration menu
    Copy the full SHA
    755acfc View commit details
    Browse the repository at this point in the history

Commits on Jan 7, 2026

  1. [5.2.x] Made release test script use a random available port.

    Co-authored-by: Jake Howard <git@theorangeone.net>
    
    Backport of c08ed08 from main.
    jacobtylerwalls committed Jan 7, 2026
    Configuration menu
    Copy the full SHA
    e8317e0 View commit details
    Browse the repository at this point in the history

Commits on Jan 8, 2026

  1. [5.2.x] Clarified regression nature of data loss bug in docs/releases…

    …/5.2.10.txt.
    
    Backport of 2be860d from main.
    timgraham authored and jacobtylerwalls committed Jan 8, 2026
    Configuration menu
    Copy the full SHA
    3ea659d View commit details
    Browse the repository at this point in the history

Commits on Jan 27, 2026

  1. Configuration menu
    Copy the full SHA
    d8c551d View commit details
    Browse the repository at this point in the history

Commits on Feb 3, 2026

  1. [5.2.x] Fixed CVE-2025-13473 -- Standardized timing of check_password…

    …() in mod_wsgi auth handler.
    
    Refs CVE-2024-39329, #20760.
    
    Thanks Stackered for the report, and Jacob Walls and Markus Holtermann
    for the reviews.
    
    Co-authored-by: Natalia <124304+nessita@users.noreply.github.com>
    
    Backport of 3eb814e from main.
    RealOrangeOne authored and jacobtylerwalls committed Feb 3, 2026
    Configuration menu
    Copy the full SHA
    184e38a View commit details
    Browse the repository at this point in the history
  2. [5.2.x] Fixed CVE-2025-14550 -- Optimized repeated header parsing in …

    …ASGI requests.
    
    Thanks Jiyong Yang for the report, and Natalia Bidart, Jacob Walls, and
    Shai Berger for reviews.
    
    Backport of eb22e1d from main.
    RealOrangeOne authored and jacobtylerwalls committed Feb 3, 2026
    Configuration menu
    Copy the full SHA
    1ba9006 View commit details
    Browse the repository at this point in the history
  3. [5.2.x] Fixed CVE-2026-1207 -- Prevented SQL injections in RasterFiel…

    …d lookups via band index.
    
    Thanks Tarek Nakkouch for the report, and Simon Charette for the initial
    triage and review.
    
    Backport of 81aa529 from main.
    jacobtylerwalls committed Feb 3, 2026
    Configuration menu
    Copy the full SHA
    17a1d64 View commit details
    Browse the repository at this point in the history
  4. [5.2.x] Fixed CVE-2026-1285 -- Mitigated potential DoS in django.util…

    …s.text.Truncator for HTML input.
    
    The `TruncateHTMLParser` used `deque.remove()` to remove tags from the
    stack when processing end tags. With crafted input containing many
    unmatched end tags, this caused repeated full scans of the tag stack,
    leading to quadratic time complexity.
    
    The fix uses LIFO semantics, only removing a tag from the stack when it
    matches the most recently opened tag. This avoids linear scans for
    unmatched end tags and reduces complexity to linear time.
    
    Refs #30686 and 6ee37ad.
    
    Thanks Seokchan Yoon for the report, and Jake Howard and Jacob Walls for
    reviews.
    
    Backport of a33540b from main.
    nessita authored and jacobtylerwalls committed Feb 3, 2026
    Configuration menu
    Copy the full SHA
    9f2ada8 View commit details
    Browse the repository at this point in the history
  5. [5.2.x] Fixed CVE-2026-1287 -- Protected against SQL injection in col…

    …umn aliases via control characters.
    
    Control characters in FilteredRelation column aliases could be used for
    SQL injection attacks. This affected QuerySet.annotate(), aggregate(),
    extra(), values(), values_list(), and alias() when using dictionary
    expansion with **kwargs.
    
    Thanks Solomon Kebede for the report, and Simon Charette, Jacob Walls,
    and Natalia Bidart for reviews.
    
    Backport of e891a84 from main.
    RealOrangeOne authored and jacobtylerwalls committed Feb 3, 2026
    Configuration menu
    Copy the full SHA
    3e68ccd View commit details
    Browse the repository at this point in the history
  6. [5.2.x] Fixed CVE-2026-1312 -- Protected order_by() from SQL injectio…

    …n via aliases with periods.
    
    Before, `order_by()` treated a period in a field name as a sign that it
    was requested via `.extra(order_by=...)` and thus should be passed
    through as raw table and column names, even if `extra()` was not used.
    Since periods are permitted in aliases, this meant user-controlled
    aliases could force the `order_by()` clause to resolve to a raw table
    and column pair instead of the actual target field for the alias.
    
    In practice, only `FilteredRelation` was affected, as the other
    expressions we tested, e.g. `F`, aggressively optimize away the ordering
    expressions into ordinal positions, e.g. ORDER BY 2, instead of ORDER BY
    "table".column.
    
    Thanks Solomon Kebede for the report, and Simon Charette and Jake Howard
    for reviews.
    
    Backport of 69065ca from main.
    jacobtylerwalls committed Feb 3, 2026
    Configuration menu
    Copy the full SHA
    e863ee2 View commit details
    Browse the repository at this point in the history
  7. [5.2.x] Refs CVE-2026-1312 -- Raised ValueError when FilteredRelation…

    … aliases contain periods.
    
    This prevents failures at the database layer, given that aliases in the
    ON clause are not quoted.
    
    Systematically quoting aliases even in FilteredRelation is tracked in
    https://code.djangoproject.com/ticket/36795.
    
    Backport of 005d60d from main.
    jacobtylerwalls committed Feb 3, 2026
    Configuration menu
    Copy the full SHA
    ab0ad8d View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    4a96a19 View commit details
    Browse the repository at this point in the history
Loading