Skip to content

chore(deps): update dependency django to v5.2.2 [security] - abandoned #13410

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

renovate-bot
Copy link
Contributor

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
Django (changelog) ==4.2.21 -> ==5.2.2 age adoption passing confidence
Django (changelog) ==5.2.1 -> ==5.2.2 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2025-48432

An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2.22. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.


Release Notes

django/django (Django)

v5.2.2

Compare Source

v5.2.1

Compare Source

v5.2

Compare Source

v5.1.10

Compare Source

v5.1.9

Compare Source

v5.1.8

Compare Source

v5.1.7

Compare Source

v5.1.6

Compare Source

v5.1.5

Compare Source

v5.1.4

Compare Source

v5.1.3

Compare Source

v5.1.2

Compare Source

v5.1.1

Compare Source

v5.1

Compare Source

v5.0.14

Compare Source

v5.0.13

Compare Source

v5.0.12

Compare Source

v5.0.11

Compare Source

v5.0.10

Compare Source

v5.0.9

Compare Source

v5.0.8

Compare Source

v5.0.7

Compare Source

v5.0.6

Compare Source

v5.0.5

Compare Source

v5.0.4

Compare Source

v5.0.3

Compare Source

v5.0.2

Compare Source

v5.0.1

Compare Source

v5.0

Compare Source

v4.2.22

Compare Source


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Never, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about these updates again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate-bot renovate-bot requested review from a team as code owners June 6, 2025 17:04
@trusted-contributions-gcf trusted-contributions-gcf bot added kokoro:force-run Add this label to force Kokoro to re-run the tests. owlbot:run Add this label to trigger the Owlbot post processor. labels Jun 6, 2025
@product-auto-label product-auto-label bot added samples Issues that are directly related to samples. api: appengine Issues related to the App Engine Admin API API. api: container Issues related to the Kubernetes Engine API API. api: run Issues related to the Cloud Run API. labels Jun 6, 2025
Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hello @renovate-bot, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

Summary of Changes

Hello team,

Gemini here, providing a summary of this pull request authored by renovate-bot. The primary goal of this PR is to update the Django dependency across several sample applications to version 5.2.2. This update is particularly important as it includes a security fix for CVE-2025-48432, which addresses a potential log injection vulnerability in internal HTTP response logging.

The PR updates requirements.txt files in various sample directories, bringing them up to the latest patch version 5.2.2. For some configurations targeting older Python versions (>= 3.8 and < 3.10), this involves a more significant jump from 4.2.21 to 5.2.2.

Please review the changes, paying attention to the version updates in the requirements.txt files and ensuring compatibility with the respective sample applications and their target Python versions.

Highlights

  • Dependency Update: Updates the Django dependency to version 5.2.2 in multiple sample application requirements.txt files.
  • Security Fix: The update to 5.2.2 includes a fix for CVE-2025-48432, a security vulnerability related to log injection.
  • Version Jumps: For samples targeting Python versions >= 3.8 and < 3.10, the Django version is updated from 4.2.21 directly to 5.2.2.

Changelog

Click here to see the changelog
  • appengine/flexible/django_cloudsql/requirements.txt
    • Updated Django from 5.2.1 to 5.2.2.
  • appengine/flexible/hello_world_django/requirements.txt
    • Updated Django from 5.2.1 to 5.2.2.
  • appengine/flexible_python37_and_earlier/django_cloudsql/requirements.txt
    • Updated Django from 5.2.1 to 5.2.2.
  • appengine/flexible_python37_and_earlier/hello_world_django/requirements.txt
    • Updated Django from 5.2.1 to 5.2.2.
  • kubernetes_engine/django_tutorial/requirements.txt
    • Updated Django from 5.2.1 to 5.2.2 for python_version >= "3.10".
    • Updated Django from 4.2.21 to 5.2.2 for python_version >= "3.8" and python_version < "3.10".
  • run/django/requirements.txt
    • Updated Django from 5.2.1 to 5.2.2 for python_version >= "3.10".
    • Updated Django from 4.2.21 to 5.2.2 for python_version >= "3.8" and python_version < "3.10".
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point in your pull request via creating an issue comment (i.e. comment on the pull request page) using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in issue comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist is currently in preview and may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments to provide feedback.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@kokoro-team kokoro-team removed the kokoro:force-run Add this label to force Kokoro to re-run the tests. label Jun 6, 2025
Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request updates the Django dependency across several requirements.txt files to version 5.2.2. This update includes a security fix (CVE-2025-48432), which is valuable. However, the update to Django 5.2.2 introduces compatibility issues with Python versions older than 3.10, which are used or tested in some of these samples. The review comments below detail these specific compatibility problems.

Summary of Findings

  • Django 5.2.2 Python Compatibility: Django 5.2.2 requires Python 3.10 or later. The PR updates requirements.txt files in several samples (kubernetes_engine/django_tutorial, run/django, appengine/flexible/django_cloudsql, appengine/flexible/hello_world_django, appengine/flexible_python37_and_earlier/django_cloudsql, appengine/flexible_python37_and_earlier/hello_world_django) to use Django 5.2.2 in environments targeting or testing Python versions older than 3.10 (specifically 3.7, 3.8, and 3.9). This breaks the samples' compatibility with these Python versions.

Merge Readiness

This pull request updates Django to a version with a security fix, which is good. However, the update introduces critical and high severity compatibility issues with older Python versions used by some samples. These issues must be addressed before merging. I am unable to approve this pull request; please have another reviewer approve it after the necessary changes are made.

Comment on lines 1 to 2
Django==5.2.2; python_version >= "3.10"
Django==5.2.2; python_version >= "3.8" and python_version < "3.10"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

critical

Django 5.2.2 requires Python 3.10 or later. Updating the dependency to Django==5.2.2 for python_version >= "3.8" and python_version < "3.10" will cause installation and runtime errors for users on Python 3.8 or 3.9. It seems the intention was to update the older Django version (4.2.21) to its latest patch release (4.2.22) while keeping the conditional dependency structure.

Django==5.2.2; python_version >= "3.10"
Django==4.2.22; python_version >= "3.8" and python_version < "3.10"

Comment on lines 1 to 2
Django==5.2.2; python_version >= "3.10"
Django==5.2.2; python_version >= "3.8" and python_version < "3.10"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

critical

Similar to the kubernetes_engine/django_tutorial sample, Django 5.2.2 requires Python 3.10 or later. Applying Django==5.2.2 to python_version >= "3.8" and python_version < "3.10" will break compatibility for users on Python 3.8 or 3.9. Please update the older Django version (4.2.21) to its latest patch release (4.2.22) while maintaining the conditional dependency.

Django==5.2.2; python_version >= "3.10"
Django==4.2.22; python_version >= "3.8" and python_version < "3.10"

@@ -1,4 +1,4 @@
Django==5.2.1
Django==5.2.2
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

high

The noxfile_config.py for this sample tests against Python 3.9 (among others). Django 5.2.2 is not compatible with Python 3.9 (it requires 3.10+). Updating to 5.2.2 will break the test environment for Python 3.9. To maintain compatibility with Python 3.9, please pin to the latest compatible Django 4.2.x version, which is 4.2.22.

Django==4.2.22

@@ -1,2 +1,2 @@
Django==5.2.1
Django==5.2.2
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

high

The noxfile_config.py for this sample tests against Python 3.8 and 3.9 (among others). Django 5.2.2 is not compatible with Python 3.8 or 3.9 (it requires 3.10+). Updating to 5.2.2 will break the test environment for these Python versions. To maintain compatibility with Python 3.8 and 3.9, please pin to the latest compatible Django 4.2.x version, which is 4.2.22.

Django==4.2.22

@@ -1,4 +1,4 @@
Django==5.2.1
Django==5.2.2
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

high

This sample is explicitly for Python 3.7 and earlier, and the noxfile_config.py tests against Python 3.7. Django 5.2.2 is not compatible with Python 3.7 (it requires 3.10+). Updating to 5.2.2 fundamentally breaks this sample's compatibility with its target Python version. For Python 3.7 compatibility, you should use a Django version from the 3.2.x LTS series (which supports Python 3.6+). The latest is 3.2.25.

Django==3.2.25

@@ -1,2 +1,2 @@
Django==5.2.1
Django==5.2.2
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

high

This sample is explicitly for Python 3.7 and earlier, and the noxfile_config.py tests against Python 3.7. Django 5.2.2 is not compatible with Python 3.7 (it requires 3.10+). Updating to 5.2.2 fundamentally breaks this sample's compatibility with its target Python version. For Python 3.7 compatibility, you should use a Django version from the 3.2.x LTS series (which supports Python 3.6+). The latest is 3.2.25.

Django==3.2.25

@trusted-contributions-gcf trusted-contributions-gcf bot added the kokoro:force-run Add this label to force Kokoro to re-run the tests. label Jun 9, 2025
@kokoro-team kokoro-team removed the kokoro:force-run Add this label to force Kokoro to re-run the tests. label Jun 9, 2025
@glasnt glasnt assigned glasnt and unassigned jinglundong Jun 9, 2025
@renovate-bot renovate-bot changed the title chore(deps): update dependency django to v5.2.2 [security] chore(deps): update dependency django to v5.2.2 [security] - abandoned Jun 9, 2025
Copy link

Autoclosing Skipped

This PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error.

@glasnt
Copy link
Contributor

glasnt commented Jun 9, 2025

This was replaced with #13415 but this PR was not closed.

@glasnt glasnt closed this Jun 9, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
api: appengine Issues related to the App Engine Admin API API. api: container Issues related to the Kubernetes Engine API API. api: run Issues related to the Cloud Run API. owlbot:run Add this label to trigger the Owlbot post processor. samples Issues that are directly related to samples.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants