Security update for python-Django

This update for python-Django fixes the following issues:

Security issues fixed:

- CVE-2019-11358: Fixed prototype pollution.
- CVE-2019-12308: Fixed XSS in AdminURLFieldWidget (bsc#1136468)
- CVE-2019-12781: Fixed incorrect HTTP detection with reverse-proxy connecting via HTTPS (bsc#1139945).
- CVE-2019-14232: Fixed denial-of-service possibility in ``django.utils.text.Truncator`` (bsc#1142880).
- CVE-2019-14233: Fixed denial-of-service possibility in ``strip_tags()`` (bsc#1142882).
- CVE-2019-14234: Fixed SQL injection possibility in key and index lookups for ``JSONField``/``HStoreField`` (bsc#1142883).
- CVE-2019-14235: Fixed potential memory exhaustion in ``django.utils.encoding.uri_to_iri()`` (bsc#1142885).

Non-security issues fixed:

- Fixed a migration crash on PostgreSQL when adding a check constraint with a contains lookup on DateRangeField or DateTimeRangeField, if the right hand side of an expression is the same type.

This update was imported from the openSUSE:Leap:15.1:Update update project.

Fixed bugs
bnc#1142883
VUL-0: CVE-2019-14234: python-Django: SQL injection possibility in key and index lookups for ``JSONField``/``HStoreField``
bnc#1142885
VUL-0: CVE-2019-14235: python-Django: Potential memory exhaustion in ``django.utils.encoding.uri_to_iri()``
bnc#1142882
VUL-0: CVE-2019-14233: python-Django: Denial-of-service possibility in ``strip_tags()``
bnc#1142880
VUL-0: CVE-2019-14232: python-Django: Denial-of-service possibility in ``django.utils.text.Truncator``
bnc#1139945
VUL-0: CVE-2019-12781: python-Django1,python-Django: Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS
bnc#1136468
VUL-0: CVE-2019-12308: python-Django, python-Django1 : The clickable "Current URL" link generated by AdminURLFieldWidget displays the provided value without validating it as a safe URL
Selected Binaries
openSUSE Build Service is sponsored by