Revisions of python-Django

Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1145400 from Daniel Garcia's avatar Daniel Garcia (dgarcia) (revision 113)
- Add python3122.patch to fix tests with python 3.12.2
  gh#django/django#17843
- Update to 4.2.10 (bsc#1219683, CVE-2024-24680):
  - Django 4.2.10 fixes a security issue with severity "moderate" in
    4.2.9.
    CVE-2024-24680: Potential denial-of-service in intcomma template
    filter The intcomma template filter was subject to a potential
    denial-of-service attack when used with very long strings.
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1117946 from Daniel Garcia's avatar Daniel Garcia (dgarcia) (revision 108)
- Update to 4.2.6 (bsc#1215978, CVE-2023-43665)
  * CVE-2023-43665: Denial-of-service possibility in
    django.utils.text.Truncator
    The input processed by Truncator, when operating in HTML mode, has
    been limited to the first five million characters in order to
    avoid potential performance and memory issues.
  * Fixed a regression in Django 4.2.5 where overriding the deprecated
    DEFAULT_FILE_STORAGE and STATICFILES_STORAGE settings in tests
    caused the main STORAGES to mutate (#34821).
  * Fixed a regression in Django 4.2 that caused unnecessary casting
    of string based fields (CharField, EmailField, TextField,
    CICharField, CIEmailField, and CITextField) used with the __isnull
    lookup on PostgreSQL. As a consequence, indexes using an __isnull
    expression or condition created before Django 4.2 wouldn’t be used
    by the query planner, leading to a performance regression
    (#34840).
Displaying revisions 1 - 20 of 115
openSUSE Build Service is sponsored by