python-Django

Edit Package python-Django
No description set
Refresh
Refresh
Source Files
Filename Size Changed
Django-4.2.11.checksum.txt 0000002560 2.5 KB
Django-4.2.11.tar.gz 0010426858 9.94 MB
dirty-hack-remove-assert.patch 0000000874 874 Bytes
fix-safemimetext-set_payload.patch 0000000764 764 Bytes
python-Django-rpmlintrc 0000000216 216 Bytes
python-Django.changes 0000136735 134 KB
python-Django.keyring 0000007655 7.48 KB
python-Django.spec 0000005939 5.8 KB
sanitize_address.patch 0000001536 1.5 KB
Latest Revision
Ruediger Oertel's avatar Ruediger Oertel (oertel) committed (revision 5)
- Sync with Factory
- delete CVE-2024-27351.patch not needed anymore, it's part of the
  upstream source.

- Add fix-safemimetext-set_payload.patch, to support python 3.11.9+
  (gh#django/django@b231bcd19e57, bsc#1222880)
-  Update to 4.2.11 (CVE-2024-27351, bsc#1220358)
  * CVE-2024-27351: Potential regular expression denial-of-service in
    django.utils.text.Truncator.words()
  * Fixed a regression in Django 4.2.10 where intcomma template filter
    could return a leading comma for string representation of floats
- Remove python3122.patch, already upstream

- Add python3122.patch to fix tests with python 3.12.2
  gh#django/django#17843
- Update to 4.2.10 (bsc#1219683, CVE-2024-24680):
  - Django 4.2.10 fixes a security issue with severity "moderate" in
    4.2.9.
    CVE-2024-24680: Potential denial-of-service in intcomma template
    filter The intcomma template filter was subject to a potential
    denial-of-service attack when used with very long strings.
Comments 0
openSUSE Build Service is sponsored by