98f379ab77- Update to 5.2.6 (bsc#1248810) * CVE-2025-57833: Potential SQL injection in FilteredRelation column aliases * Fixed a bug where using QuerySet.values() or values_list() with a ForeignObject composed of multiple fields returned incorrect results instead of tuples of the referenced fields - Rebased test_strip_tags.patchMarkéta Machová2025-09-04 11:14:46 +00:00
9d51974b18- Update to 5.2.5 * Fixed a regression in Django 5.2.1 that prevented the usage of UNNEST PostgreSQL strategy of QuerySet.bulk_create() with foreign keys * Fixed a crash in Django 5.2 when filtering against a composite primary key using a tuple containing expressions * Fixed a crash in Django 5.2 when validating a model that uses GeneratedField or constraints composed of Q and Case lookups * Added compatibility for docutils 0.22 * Fixed a crash in Django 5.2 when using a ManyToManyField on a model with a composite primary key, by extending the fields.E347 system check - Convert to libalternatives on SLE-16-based and newer systems
devel
Markéta Machová2025-08-12 15:39:39 +00:00
de18a0b8d5- Add upstream test_trip_tags.patch to fix test errors with at-this-point future python interpretersMatej Cepl2025-07-19 10:26:26 +00:00
48f0ae5840Accepting request 1290998 from devel:languages:python:djangoAna Guerrero2025-07-08 13:28:05 +00:00
d027a9fa92- Update to 5.2.4 * Fixed a log injection possibility by migrating remaining response logging to django.utils.log.log_response(), which safely escapes arguments such as the request path to prevent unsafe log output (CVE 2025-48432). * Fixed a regression in Django 5.2 that caused QuerySet.bulk_update() to incorrectly convert None to JSON null instead of SQL NULL for JSONField * Fixed a regression in Django 5.2.2 where the q parameter was removed from the internal django.http.MediaType.params property * Fixed a regression in Django 5.2.2 where HttpRequest.get_preferred_type() incorrectly preferred more specific media types with a lower quality * Fixed a crash in Django 5.2 when performing an __in lookup involving a composite primary key and a subquery on certain backendsMarkéta Machová2025-07-07 09:04:27 +00:00
94416b615bAccepting request 1283580 from devel:languages:python:djangoAna Guerrero2025-06-10 06:59:24 +00:00
019c08ddee- Update to 5.2.2 (bsc#1244095) * CVE-2025-48432: Potential log injection via unescaped request path * Fixed a crash when using select_related against a ForeignObject originating from a model with a CompositePrimaryKey * Fixed a regression in Django 5.2 that caused a crash when no arguments were passed into QuerySet.union(). * Fixed a regression in Django 5.2 that caused a crash when using OuterRef in PostgreSQL aggregate functions ArrayAgg, StringAgg, and JSONBAgg. * Fixed a bug in Django 5.2 where HttpRequest.get_preferred_type() did not account for media type parameters in Accept headers, reducing specificity in content negotiation.Markéta Machová2025-06-06 08:51:39 +00:00
2136d497beAccepting request 1276782 from devel:languages:python:djangoAna Guerrero2025-05-13 18:12:16 +00:00
c5f3696bba- Update to 5.2.1 (bsc#1242210) * This release was built using an upgraded setuptools, producing filenames compliant with PEP 491 and PEP 625 and thus addressing a PyPI warning about non-compliant distribution filenames. This change only affects the Django packaging process and does not impact Django’s behavior. * CVE-2025-32873: Denial-of-service possibility in strip_tags() * Fixed a data corruption possibility in file_move_safe() when allow_overwrite=True * Fixed a regression introduced when fixing CVE 2025-26699, where the wordwrap template filter did not preserve empty lines between paragraphs after wrapping text * Fixed many bugs and regressions in Django 5.2, see upstream changelogMarkéta Machová2025-05-12 08:52:11 +00:00
c1bbd7f1e2Accepting request 1271967 from devel:languages:python:djangoAna Guerrero2025-04-23 13:18:25 +00:00
8cea3c6a81Accepting request 1269472 from devel:languages:python:djangoAna Guerrero2025-04-15 18:47:09 +00:00
bb643f6074- Update to 5.2 * Django 5.2 is designated as a long-term support release. It will receive security updates for at least three years after its release. * Django 5.2 supports Python 3.10, 3.11, 3.12, and 3.13. ** What’s new in Django 5.2 ** * Automatic models import in the shell * Composite Primary Keys * Simplified override of BoundField * ... and many more smaller features ** Backwards incompatible changes in 5.2 ** * Database backend API changes * Dropped support for PostgreSQL 13 * Changed MySQL connection character set default * ... and more, see upstream changelog ** Features deprecated in 5.2 ** * The all argument for the django.contrib.staticfiles.finders.find() function is deprecated in favor of the find_all argument. * The ordering keyword argument of the PostgreSQL specific aggregation functions is deprecated in favor of the order_by argument.Markéta Machová2025-04-15 07:42:05 +00:00
111c0aa28eAccepting request 1267715 from devel:languages:python:djangoAna Guerrero2025-04-11 14:45:30 +00:00
f6f2db94ee- Update to 5.1.8 * CVE-2025-27556: Potential denial-of-service vulnerability in LoginView, LogoutView, and set_language() on Windows * Fixed a regression in Django 5.1.7 where the removal of the single_object parameter unintentionally altered the signature and return type of LogEntryManager.log_actions()Markéta Machová2025-04-07 14:33:55 +00:00
bd9d4e8e4b- update filelist to be compatible with newer setuptoolsDirk Mueller2025-03-30 08:29:55 +00:00
86ddc9c8c4Accepting request 1254138 from devel:languages:python:djangoAna Guerrero2025-03-20 18:24:28 +00:00
9fb974a5c8- Update to 5.1.7 (bsc#1239052) * CVE-2025-26699: Potential denial-of-service vulnerability in django.utils.text.wrap() * Fixed a bug in Django 5.1 where the {% querystring %} template tag returned an empty string rather than "?" * Fixed a bug in Django 5.1 where FileSystemStorage, with allow_overwrite set to True, did not truncate the overwritten file content * Fixed a regression in Django 5.1 where the count and exists methods of ManyToManyField related managers would always return 0 and False when the intermediary model back references used to_field * Fixed a regression in Django 5.1 where the pre_save and post_save signals for LogEntry were not sent when deleting a single object in the adminMarkéta Machová2025-03-18 13:18:43 +00:00
4cfbeac954Accepting request 1245111 from devel:languages:python:djangoAna Guerrero2025-02-11 20:20:19 +00:00
a5b485aaa4- Update to 5.1.6 * Fixed a regression in Django 5.1.5 that caused validate_ipv6_address() and validate_ipv46_address() to crash when handling non-string values * Fixed a regression in Django 5.1 where password fields, despite being set to required=False, were still treated as required in forms derived from BaseUserCreationFormMarkéta Machová2025-02-11 14:13:37 +00:00
3cf5681960Accepting request 1238033 from devel:languages:python:djangoAna Guerrero2025-01-17 17:36:51 +00:00
b2d85302c5- Update to 5.1.5 (bsc#1235856) * CVE-2024-56374: Potential denial-of-service vulnerability in IPv6 validation * Fixed a crash when applying migrations with references to the removed Meta.index_together optionMarkéta Machová2025-01-15 12:08:37 +00:00
ed596b7283Accepting request 1229315 from devel:languages:python:djangoAna Guerrero2024-12-10 22:43:01 +00:00
cec361ba85- Update to 5.1.4 (bsc#1234231, CVE-2024-53908, bsc#1234232, CVE-2024-53907) * CVE-2024-53907: Potential denial-of-service in django.utils.html.strip_tags() * CVE-2024-53908: Potential SQL injection in HasKey(lhs, rhs) on Oracle * Fixed a crash in createsuperuser on Python 3.13+ caused by an unhandled OSError * Fixed a regression in Django 5.1 where relational fields were not updated * Fixed a bug in Django 5.1 where DomainNameValidator accepted any input value that contained a valid domain name, rather than only input values that were a valid domain name * Fixed a regression in Django 5.1 that prevented the use of DB-IP databases with GeoIP2 * Fixed a regression in Django 5.1 where non-ASCII fieldset names were not displayed when rendering admin fieldsetsMarkéta Machová2024-12-09 11:00:19 +00:00
f398fa39beAccepting request 1208607 from devel:languages:python:djangoAna Guerrero2024-10-18 13:52:54 +00:00
828c0a3f1e- Update to 5.1.2 * Fixed a regression in Django 5.1 that caused a crash when using the PostgreSQL lookup trigram_similar on output fields from Concat * Fixed a regression in Django 5.1 that caused a crash of JSONObject() when using server-side binding with PostgreSQL 16+ * Fixed a regression in Django 5.1 that made selected items in multi-select widgets indistinguishable from non-selected items in the admin dark themeMarkéta Machová2024-10-17 10:32:45 +00:00
aa9f2197a0Accepting request 1198700 from devel:languages:python:djangoAna Guerrero2024-09-05 13:46:17 +00:00
8d6af13dc7- Update to 5.1.1 (CVE-2024-45230, bsc#1229823, CVE-2024-45231, bsc#1229824) * Fixed a regression in Django 5.1 that caused a crash of Window() when passing an empty sequence to the order_by parameter, and a crash of Prefetch() for a sliced queryset without ordering * Fixed a regression in Django 5.1 where a new usable_password field was included in BaseUserCreationForm (and children). * Adjusted the deprecation warning stacklevel in Model.save() and Model.asave() to correctly point to the offending call site * Adjusted the deprecation warning stacklevel when using OS_OPEN_FLAGS in FileSystemStorage to correctly point to the offending call site * Adjusted the deprecation warning stacklevel in FieldCacheMixin.get_cache_name() to correctly point to the offending call site * Restored, following a regression in Django 5.1, the ability to override the timezone and role setting behavior used within the init_connection_state method of the PostgreSQL backend * Fixed a bug in Django 5.1 where variable lookup errors were logged when rendering admin fieldsetsMarkéta Machová2024-09-04 07:53:21 +00:00
9989555d48- Update to 5.1.1 * CVE-2024-45230: Potential denial-of-service vulnerability in django.utils.html.urlize() * CVE-2024-45231: Potential user email enumeration via response status on password reset * Fixed a regression in Django 5.1 that caused a crash of Window() when passing an empty sequence to the order_by parameter, and a crash of Prefetch() for a sliced queryset without ordering * Fixed a regression in Django 5.1 where a new usable_password field was included in BaseUserCreationForm (and children). A new AdminUserCreationForm including this field was added, isolating the feature to the admin where it was intended * Adjusted the deprecation warning stacklevel in Model.save() and Model.asave() to correctly point to the offending call site * Adjusted the deprecation warning stacklevel when using OS_OPEN_FLAGS in FileSystemStorage to correctly point to the offending call site * Adjusted the deprecation warning stacklevel in FieldCacheMixin.get_cache_name() to correctly point to the offending call site * Restored, following a regression in Django 5.1, the ability to override the timezone and role setting behavior used within the init_connection_state method of the PostgreSQL backend * Fixed a bug in Django 5.1 where variable lookup errors were logged when rendering admin fieldsetsAlberto Planas Dominguez2024-09-04 07:52:11 +00:00
159aab95f6- Update to 5.1 * Supports Python >= 3.10. * Easier guardrails for authentication: the new and shiny LoginRequiredMiddleware, when added to MIDDLEWARE, enforces authentication for all views by default. * A more inclusive framework: Django 5.1 includes several accessibility enhancements, such as improved screen reader support in the admin interface, more semantic HTML elements, and better association of help text and labels with form fieldsets. * The second oldest ticket fixed in this release provides the long awaited querystring template tag, which greatly simplifies the handling of query strings when building URLs in templates. * For a detailed list of changes see https://docs.djangoproject.com/en/5.1/releases/5.1/ - Refreshed python-Django.keyringAlberto Planas Dominguez2024-08-09 14:04:24 +00:00
56b3641859- Update to 5.0.8 * CVE-2024-41989: Memory exhaustion in django.utils.numberformat.floatformat() * CVE-2024-41990: Potential denial-of-service vulnerability in django.utils.html.urlize() * CVE-2024-41991: Potential denial-of-service vulnerability in django.utils.html.urlize() and AdminURLFieldWidget * CVE-2024-42005: Potential SQL injection in QuerySet.values() and values_list() * Added missing validation for UniqueConstraint(nulls_distinct=False) when using *expressions * Fixed a regression in Django 5.0 where ModelAdmin.action_checkbox could break the admin changelist HTML page when rendering a model instance with a __html__ method * Fixed a crash when creating a model with a Field.db_default and a Meta.constraints constraint composed of __endswith, __startswith, or __contains lookups * Fixed a regression in Django 5.0.7 that caused a crash in LocaleMiddleware when processing a language code over 500 characters * Fixed a bug in Django 5.0 that caused a system check crash when ModelAdmin.date_hierarchy was a GeneratedField with an output_field of DateField or DateTimeField * Fixed a bug in Django 5.0 which caused constraint validation to either crash or incorrectly raise validation errors for constraints referring to fields using Field.db_default * Fixed a crash in Django 5.0 when saving a model containing a FileField with a db_default setAlberto Planas Dominguez2024-08-07 06:25:06 +00:00
d8de200361Accepting request 1188243 from devel:languages:python:djangoAna Guerrero2024-07-18 17:15:46 +00:00
5cd5359fe9- Add python3122.patch to fix tests with python 3.12.2 gh#django/django#17843 - Update to 4.2.10 (bsc#1219683, CVE-2024-24680): - Django 4.2.10 fixes a security issue with severity "moderate" in 4.2.9. CVE-2024-24680: Potential denial-of-service in intcomma template filter The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.Daniel Garcia2024-02-09 10:55:29 +00:00
c93b729a7dAccepting request 1137053 from home:alarrosa:branches:devel:languages:python:djangoAlberto Planas Dominguez2024-01-05 17:21:59 +00:00
d349f9a71eAccepting request 1136760 from home:aplanas:branches:devel:languages:python:djangoAlberto Planas Dominguez2024-01-04 10:14:17 +00:00
1ffd3b773fAccepting request 1130705 from devel:languages:python:djangoAna Guerrero2023-12-05 16:00:57 +00:00
947b4638e3Accepting request 1130704 from home:aplanas:branches:devel:languages:python:djangoAlberto Planas Dominguez2023-12-04 10:38:51 +00:00
84f1c6c6dbAccepting request 1129130 from devel:languages:python:djangoAna Guerrero2023-11-27 21:42:03 +00:00
f5462fb0baAccepting request 1129117 from home:dirkmueller:branches:openSUSE:Factory:Rings:1-MinimalXMarkéta Machová2023-11-27 12:51:15 +00:00
3f20e7cd62Accepting request 1121683 from devel:languages:python:djangoAna Guerrero2023-11-02 19:20:48 +00:00
511a9bdfa8Accepting request 1121555 from home:aplanas:branches:devel:languages:python:djangoMarkéta Machová2023-11-01 19:30:35 +00:00
6550ed5d57Accepting request 1117946 from devel:languages:python:djangoAna Guerrero2023-10-16 20:32:49 +00:00
7fe88e78a2- Update to 4.2.6 (bsc#1215978, CVE-2023-43665) * CVE-2023-43665: Denial-of-service possibility in django.utils.text.Truncator The input processed by Truncator, when operating in HTML mode, has been limited to the first five million characters in order to avoid potential performance and memory issues. * Fixed a regression in Django 4.2.5 where overriding the deprecated DEFAULT_FILE_STORAGE and STATICFILES_STORAGE settings in tests caused the main STORAGES to mutate (#34821). * Fixed a regression in Django 4.2 that caused unnecessary casting of string based fields (CharField, EmailField, TextField, CICharField, CIEmailField, and CITextField) used with the __isnull lookup on PostgreSQL. As a consequence, indexes using an __isnull expression or condition created before Django 4.2 wouldn’t be used by the query planner, leading to a performance regression (#34840).Daniel Garcia2023-10-16 08:50:29 +00:00
9f73690cc9Accepting request 1108900 from devel:languages:python:djangoAna Guerrero2023-09-06 16:55:51 +00:00
b9976f23ddAccepting request 1108899 from home:aplanas:branches:devel:languages:python:djangoAlberto Planas Dominguez2023-09-04 14:23:01 +00:00