<feed xmlns='http://www.w3.org/2005/Atom'>
<title>django.git, branch 4.2.15</title>
<subtitle>django
</subtitle>
<id>http://cgit.adnoto.dev/django.git/atom?h=4.2.15</id>
<link rel='self' href='http://cgit.adnoto.dev/django.git/atom?h=4.2.15'/>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/'/>
<updated>2024-08-06T12:56:30Z</updated>
<entry>
<title>[4.2.x] Bumped version for 4.2.15 release.</title>
<updated>2024-08-06T12:56:30Z</updated>
<author>
<name>Sarah Boyce</name>
<email>42296566+sarahboyce@users.noreply.github.com</email>
</author>
<published>2024-08-06T12:56:30Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=4d32ebcd57340aa8de2d6d31613f1646dc6391f6'/>
<id>urn:sha1:4d32ebcd57340aa8de2d6d31613f1646dc6391f6</id>
<content type='text'>
</content>
</entry>
<entry>
<title>[4.2.x] Fixed CVE-2024-42005 -- Mitigated QuerySet.values() SQL injection attacks against JSON fields.</title>
<updated>2024-07-31T14:12:35Z</updated>
<author>
<name>Simon Charette</name>
<email>charette.s@gmail.com</email>
</author>
<published>2024-07-25T16:19:13Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=f4af67b9b41e0f4c117a8741da3abbd1c869ab28'/>
<id>urn:sha1:f4af67b9b41e0f4c117a8741da3abbd1c869ab28</id>
<content type='text'>
Thanks Eyal (eyalgabay) for the report.
</content>
</entry>
<entry>
<title>[4.2.x] Fixed CVE-2024-41991 -- Prevented potential ReDoS in django.utils.html.urlize() and AdminURLFieldWidget.</title>
<updated>2024-07-31T14:12:23Z</updated>
<author>
<name>Mariusz Felisiak</name>
<email>felisiak.mariusz@gmail.com</email>
</author>
<published>2024-07-10T18:30:12Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=efea1ef7e2190e3f77ca0651b5458297bc0f6a9f'/>
<id>urn:sha1:efea1ef7e2190e3f77ca0651b5458297bc0f6a9f</id>
<content type='text'>
Thanks Seokchan Yoon for the report.

Co-authored-by: Sarah Boyce &lt;42296566+sarahboyce@users.noreply.github.com&gt;
</content>
</entry>
<entry>
<title>[4.2.x] Fixed CVE-2024-41990 -- Mitigated potential DoS in urlize and urlizetrunc template filters.</title>
<updated>2024-07-31T14:12:11Z</updated>
<author>
<name>Sarah Boyce</name>
<email>42296566+sarahboyce@users.noreply.github.com</email>
</author>
<published>2024-07-18T11:19:34Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=d0a82e26a74940bf0c78204933c3bdd6a283eb88'/>
<id>urn:sha1:d0a82e26a74940bf0c78204933c3bdd6a283eb88</id>
<content type='text'>
Thanks to MProgrammer for the report.
</content>
</entry>
<entry>
<title>[4.2.x] Fixed CVE-2024-41989 -- Prevented excessive memory consumption in floatformat.</title>
<updated>2024-07-31T14:11:59Z</updated>
<author>
<name>Sarah Boyce</name>
<email>42296566+sarahboyce@users.noreply.github.com</email>
</author>
<published>2024-07-12T09:38:34Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=fc76660f589ac07e45e9cd34ccb8087aeb11904b'/>
<id>urn:sha1:fc76660f589ac07e45e9cd34ccb8087aeb11904b</id>
<content type='text'>
Thanks Elias Myllymäki for the report.

Co-authored-by: Shai Berger &lt;shai@platonix.com&gt;
</content>
</entry>
<entry>
<title>[4.2.x] Added stub release notes and release date for 4.2.15.</title>
<updated>2024-07-31T09:29:30Z</updated>
<author>
<name>Sarah Boyce</name>
<email>42296566+sarahboyce@users.noreply.github.com</email>
</author>
<published>2024-07-31T09:21:32Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=7b1a76f899f7a7acb7d70b433cb0064c2184186b'/>
<id>urn:sha1:7b1a76f899f7a7acb7d70b433cb0064c2184186b</id>
<content type='text'>
Backport of 3f880890699d4412cf23b59dba425111f62afb3a from main.
</content>
</entry>
<entry>
<title>[4.2.x] Fixed #35627 -- Raised a LookupError rather than an unhandled ValueError in get_supported_language_variant().</title>
<updated>2024-07-25T07:44:51Z</updated>
<author>
<name>Lorenzo Peña</name>
<email>lorinkoz@gmail.com</email>
</author>
<published>2024-07-23T10:06:29Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=96a349740048ecd4746ac2f15751865219d445cf'/>
<id>urn:sha1:96a349740048ecd4746ac2f15751865219d445cf</id>
<content type='text'>
LocaleMiddleware didn't handle the ValueError raised by
get_supported_language_variant() when language codes were
over 500 characters.

Regression in 9e9792228a6bb5d6402a5d645bc3be4cf364aefb.

Backport of 0e94f292cda632153f2b3d9a9037eb0141ae9c2e from main.
</content>
</entry>
<entry>
<title>[4.2.x] Fixed auth_tests and file_storage tests on Python 3.8.</title>
<updated>2024-07-11T09:10:15Z</updated>
<author>
<name>Mariusz Felisiak</name>
<email>felisiak.mariusz@gmail.com</email>
</author>
<published>2024-07-11T06:03:00Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=c5d196a65264136ee6795356871a29f3d22ec52f'/>
<id>urn:sha1:c5d196a65264136ee6795356871a29f3d22ec52f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>[4.2.x] Added CVE-2024-38875, CVE-2024-39329, CVE-2024-39330, and CVE-2024-39614 to security archive.</title>
<updated>2024-07-09T15:00:22Z</updated>
<author>
<name>Natalia</name>
<email>124304+nessita@users.noreply.github.com</email>
</author>
<published>2024-07-09T14:56:57Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=8e59e33400ffcec262116d75f7886d96e2b57980'/>
<id>urn:sha1:8e59e33400ffcec262116d75f7886d96e2b57980</id>
<content type='text'>
Backport of e095c7612d49dbe371e9c7edd76ba99b6bc4f9f6 from main.
</content>
</entry>
<entry>
<title>[4.2.x] Post-release version bump.</title>
<updated>2024-07-09T14:08:49Z</updated>
<author>
<name>Natalia</name>
<email>124304+nessita@users.noreply.github.com</email>
</author>
<published>2024-07-09T14:08:49Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=72f6c7d3a6551b1aed1e4d248e5fbe94d2a8fc0b'/>
<id>urn:sha1:72f6c7d3a6551b1aed1e4d248e5fbe94d2a8fc0b</id>
<content type='text'>
</content>
</entry>
</feed>
