Path to this page:
./
www/py-django4,
Django, a high-level Python Web framework
Branch: CURRENT,
Version: 4.2.17,
Package name: py312-django-4.2.17,
Maintainer: pkgsrc-usersDjango is a high-level Python Web framework that encourages rapid development
and clean, pragmatic design. Django was designed to make common Web-development
tasks fast and easy.
Master sites:
Filesize: 10193.041 KB
Version history: (Expand)
- (2024-12-04) Updated to version: py312-django-4.2.17
- (2024-09-06) Updated to version: py312-django-4.2.16
- (2024-08-16) Updated to version: py312-django-4.2.15
- (2024-08-06) Updated to version: py311-django-4.2.15
- (2024-07-11) Updated to version: py311-django-4.2.14
- (2024-05-07) Updated to version: py311-django-4.2.13
CVS history: (Expand)
2024-12-04 21:21:06 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message:
py-django4: updated to 4.2.17
4.2.17
Django 4.2.17 fixes one security issue with severity “high” and one security \
issue with severity “moderate” in 4.2.16.
CVE-2024-53907: Denial-of-service possibility in strip_tags()
strip_tags() would be extremely slow to evaluate certain inputs containing large \
sequences of nested incomplete HTML entities. The strip_tags() method is used to \
implement the corresponding striptags template filter, which was thus also \
vulnerable.
strip_tags() now has an upper limit of recursive calls to HTMLParser before \
raising a SuspiciousOperation exception.
Remember that absolutely NO guarantee is provided about the results of \
strip_tags() being HTML safe. So NEVER mark safe the result of a strip_tags() \
call without escaping it first, for example with django.utils.html.escape().
CVE-2024-53908: Potential SQL injection via HasKey(lhs, rhs) on Oracle
Direct usage of the django.db.models.fields.json.HasKey lookup on Oracle was \
subject to SQL injection if untrusted data was used as a lhs value.
Applications that use the has_key lookup through the __ syntax are unaffected.
|
2024-11-11 08:29:31 by Thomas Klausner | Files touched by this commit (862) |
Log message:
py-*: remove unused tool dependency
py-setuptools includes the py-wheel functionality nowadays
|
2024-08-15 23:55:19 by Thomas Klausner | Files touched by this commit (6) |
Log message:
*: remove Python 3.9 specific dependencies
in a quest to fix pbulk
|
2024-05-07 20:17:41 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message:
py-django4: updated to 4.2.13
Django 4.2.13 fixes a packaging error in 4.2.12.
|
2024-05-07 05:56:44 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message:
py-django4: updated to 4.2.12
Django 4.2.12 fixes a compatibility issue with Python 3.11.9+ and 3.12.3+.
Fixed a crash in Django 4.2 when validating email max line lengths with content \
decoded using the surrogateescape error handling scheme
|
2024-03-04 16:48:16 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message:
py-django4: updated to 4.2.11
Django 4.2.11 fixes a security issue with severity “moderate” and a \
regression in 4.2.10.
CVE-2024-27351: Potential regular expression denial-of-service in \
django.utils.text.Truncator.words()
django.utils.text.Truncator.words() method (with html=True) and \
truncatewords_html template filter were subject to a potential regular \
expression denial-of-service attack using a suitably crafted string (follow up \
to CVE-2019-14232 and CVE-2023-43665).
Bugfixes
Fixed a regression in Django 4.2.10 where intcomma template filter could return \
a leading comma for string representation of floats.
|
2024-02-09 11:34:29 by Adam Ciarcinski | Files touched by this commit (4) |
Log message:
Replace databases/py-mysqldb with databases/py-mysqlclient
|
2024-02-08 23:42:53 by Adam Ciarcinski | Files touched by this commit (6) |
Log message:
py-django4: added version 4.2.10
Django 4.2.10 fixes a security issue with severity “moderate” in 4.2.9.
CVE-2024-24680: Potential denial-of-service in intcomma template filter
The intcomma template filter was subject to a potential denial-of-service attack \
when used with very long strings.
|