python-Django
No description set
- Sources inherited from project SUSE:SLE-15-SP6:GA
-
1
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Leap:15.6:Update/python-Django && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
Django-4.2.11.checksum.txt | 0000002560 2.5 KB | |
Django-4.2.11.tar.gz | 0010426858 9.94 MB | |
dirty-hack-remove-assert.patch | 0000000874 874 Bytes | |
fix-safemimetext-set_payload.patch | 0000000764 764 Bytes | |
python-Django-rpmlintrc | 0000000216 216 Bytes | |
python-Django.changes | 0000136735 134 KB | |
python-Django.keyring | 0000007655 7.48 KB | |
python-Django.spec | 0000005939 5.8 KB | |
sanitize_address.patch | 0000001536 1.5 KB |
Latest Revision
Ruediger Oertel (oertel)
committed
(revision 5)
- Sync with Factory - delete CVE-2024-27351.patch not needed anymore, it's part of the upstream source. - Add fix-safemimetext-set_payload.patch, to support python 3.11.9+ (gh#django/django@b231bcd19e57, bsc#1222880) - Update to 4.2.11 (CVE-2024-27351, bsc#1220358) * CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words() * Fixed a regression in Django 4.2.10 where intcomma template filter could return a leading comma for string representation of floats - Remove python3122.patch, already upstream - Add python3122.patch to fix tests with python 3.12.2 gh#django/django#17843 - Update to 4.2.10 (bsc#1219683, CVE-2024-24680): - Django 4.2.10 fixes a security issue with severity "moderate" in 4.2.9. CVE-2024-24680: Potential denial-of-service in intcomma template filter The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
Comments 0