package/python-django: security bump to version 4.1.13

Fixes the following (Windows-only) security issue:

CVE-2023-46695: Potential denial of service vulnerability in UsernameField
on Windows

The NFKC normalization is slow on Windows.  As a consequence,
django.contrib.auth.forms.UsernameField was subject to a potential denial of
service attack via certain inputs with a very large number of Unicode
characters.

In order to avoid the vulnerability, invalid values longer than
UsernameField.max_length are no longer normalized, since they cannot pass
validation anyway.

https://www.djangoproject.com/weblog/2023/nov/01/security-releases/

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
This commit is contained in:
Peter Korsgaard
2023-11-08 19:05:48 +01:00
parent 784f7aa398
commit cd8bf27f72
2 changed files with 4 additions and 4 deletions

View File

@@ -1,5 +1,5 @@
# md5, sha256 from https://pypi.org/pypi/django/json
md5 6f95e92e5e8964c4a1e00e2fcaadf437 Django-4.1.12.tar.gz
sha256 d02483ad49872238fa59875c1269293fe4f17ecee13c121893607cc0b284696b Django-4.1.12.tar.gz
md5 a16208af2aa54cbe97ff79ec4426da84 Django-4.1.13.tar.gz
sha256 94a3f471e833c8f124ee7a2de11e92f633991d975e3fa5bdd91e8abd66426318 Django-4.1.13.tar.gz
# Locally computed sha256 checksums
sha256 b846415d1b514e9c1dff14a22deb906d794bc546ca6129f950a18cd091e2a669 LICENSE

View File

@@ -4,10 +4,10 @@
#
################################################################################
PYTHON_DJANGO_VERSION = 4.1.12
PYTHON_DJANGO_VERSION = 4.1.13
PYTHON_DJANGO_SOURCE = Django-$(PYTHON_DJANGO_VERSION).tar.gz
# The official Django site has an unpractical URL
PYTHON_DJANGO_SITE = https://files.pythonhosted.org/packages/68/76/b1cf87eda3bf5b2d7dd9a23bb4df70ea5511e426a54a04ed2c4ca2ff67cd
PYTHON_DJANGO_SITE = https://files.pythonhosted.org/packages/34/09/300498ca0a5f37e0621b90a94c71fc8a4227be5488a3bd5550869c6e0049
PYTHON_DJANGO_LICENSE = BSD-3-Clause
PYTHON_DJANGO_LICENSE_FILES = LICENSE
PYTHON_DJANGO_CPE_ID_VENDOR = djangoproject