* CVE-2024-41989: Memory exhaustion in
django.utils.numberformat.floatformat()
* CVE-2024-41990: Potential denial-of-service vulnerability in
django.utils.html.urlize()
* CVE-2024-41991: Potential denial-of-service vulnerability in
django.utils.html.urlize() and AdminURLFieldWidget
* CVE-2024-42005: Potential SQL injection in QuerySet.values() and
values_list()
* Fixed a regression in Django 4.2.14 that caused a crash in
LocaleMiddleware when processing a language code over 500
characters
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django4?expand=0&rev=5
* Django 4.2.14 fixes two security issues with severity “moderate”
and two security issues with severity “low" in 4.2.13
* CVE-2024-38875: Potential denial-of-service vulnerability in
django.utils.html.urlize() (bsc#1227590)
* CVE-2024-39329: Username enumeration through timing difference
for users with unusable passwords (bsc#1227593)
* CVE-2024-39330: Potential directory-traversal via Storage.save()
(bsc#1227594)
* CVE-2024-39614: Potential denial-of-service vulnerability in
get_supported_language_variant() (bsc#1227595)
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django4?expand=0&rev=2