<feed xmlns='http://www.w3.org/2005/Atom'>
<title>django.git, branch 4.2.27</title>
<subtitle>django
</subtitle>
<id>http://cgit.adnoto.dev/django.git/atom?h=4.2.27</id>
<link rel='self' href='http://cgit.adnoto.dev/django.git/atom?h=4.2.27'/>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/'/>
<updated>2025-12-02T12:45:57Z</updated>
<entry>
<title>[4.2.x] Bumped version for 4.2.27 release.</title>
<updated>2025-12-02T12:45:57Z</updated>
<author>
<name>Natalia</name>
<email>124304+nessita@users.noreply.github.com</email>
</author>
<published>2025-12-02T12:45:57Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=5948e6657f8cb6aeaab1a5a45640d089230f461a'/>
<id>urn:sha1:5948e6657f8cb6aeaab1a5a45640d089230f461a</id>
<content type='text'>
</content>
</entry>
<entry>
<title>[4.2.x] Fixed CVE-2025-64460 -- Corrected quadratic inner text accumulation in XML serializer.</title>
<updated>2025-12-02T12:44:40Z</updated>
<author>
<name>Shai Berger</name>
<email>shai@platonix.com</email>
</author>
<published>2025-10-11T18:42:56Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=4d2b8803bebcdefd2b76e9e8fc528d5fddea93f0'/>
<id>urn:sha1:4d2b8803bebcdefd2b76e9e8fc528d5fddea93f0</id>
<content type='text'>
Previously, `getInnerText()` recursively used `list.extend()` on strings,
which added each character from child nodes as a separate list element.
On deeply nested XML content, this caused the overall deserialization
work to grow quadratically with input size, potentially allowing
disproportionate CPU consumption for crafted XML.

The fix separates collection of inner texts from joining them, so that
each subtree is joined only once, reducing the complexity to linear in
the size of the input. These changes also include a mitigation for a
xml.dom.minidom performance issue.

Thanks Seokchan Yoon (https://ch4n3.kr/) for report.

Co-authored-by: Jacob Walls &lt;jacobtylerwalls@gmail.com&gt;
Co-authored-by: Natalia &lt;124304+nessita@users.noreply.github.com&gt;

Backport of 50efb718b31333051bc2dcb06911b8fa1358c98c from main.
</content>
</entry>
<entry>
<title>[4.2.x] Fixed CVE-2025-13372 -- Protected FilteredRelation against SQL injection in column aliases on PostgreSQL.</title>
<updated>2025-12-02T12:44:19Z</updated>
<author>
<name>Jacob Walls</name>
<email>jacobtylerwalls@gmail.com</email>
</author>
<published>2025-11-17T22:09:54Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=f997037b235f6b5c9e7c4a501491ec45f3400f3d'/>
<id>urn:sha1:f997037b235f6b5c9e7c4a501491ec45f3400f3d</id>
<content type='text'>
Follow-up to CVE-2025-57833.

Thanks Stackered for the report, and Simon Charette and Mariusz Felisiak
for the reviews.

Backport of 5b90ca1e7591fa36fccf2d6dad67cf1477e6293e from main.
</content>
</entry>
<entry>
<title>[4.2.x] Added script to archive EOL stable branches.</title>
<updated>2025-11-26T23:08:24Z</updated>
<author>
<name>Natalia</name>
<email>124304+nessita@users.noreply.github.com</email>
</author>
<published>2025-11-26T16:22:52Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=4b5dcc96f2996150ff2675233ec0a69f67b7dc9b'/>
<id>urn:sha1:4b5dcc96f2996150ff2675233ec0a69f67b7dc9b</id>
<content type='text'>
This also fixed a small bash issue in `confirm_release.sh` script.

Backport of 532c1058a7dd2616181259c94eb92f2477038d2c from main.
</content>
</entry>
<entry>
<title>[4.2.x] Refs #36743 -- Added missing release notes for 5.1.15 and 4.2.27.</title>
<updated>2025-11-26T23:04:08Z</updated>
<author>
<name>Natalia</name>
<email>124304+nessita@users.noreply.github.com</email>
</author>
<published>2025-11-26T20:22:53Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=0e85bdbde1c1fdbd3a92cdb6d31fab788811da63'/>
<id>urn:sha1:0e85bdbde1c1fdbd3a92cdb6d31fab788811da63</id>
<content type='text'>
The fix landed in a8cf8c292cfee98fe6cc873ca5221935f1d02271 will be
backported to 5.1 and 4.2 since the 2048 limit was rolled out as part of
the security release for CVE-2025-64458.

Backport of 18b13cf6c48ff0a20b2a74d3b90d1fc1602608e4 from main.
</content>
</entry>
<entry>
<title>[4.2.x] Fixed #36743 -- Increased URL max length enforced in HttpResponseRedirectBase.</title>
<updated>2025-11-26T20:31:17Z</updated>
<author>
<name>varunkasyap</name>
<email>varunkasyap@hotmail.com</email>
</author>
<published>2025-11-26T17:28:24Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=e6973490373dca340e36f2db3eae1eb26a6a2d80'/>
<id>urn:sha1:e6973490373dca340e36f2db3eae1eb26a6a2d80</id>
<content type='text'>
Refs CVE-2025-64458.

The previous limit of 2048 characters reused the URLValidator constant
and proved too restrictive for legitimate redirects to some third-party
services. This change introduces a separate `MAX_URL_REDIRECT_LENGTH`
constant (defaulting to 16384) and uses it in HttpResponseRedirectBase.

Thanks Jacob Walls for report and review.

Backport of a8cf8c292cfee98fe6cc873ca5221935f1d02271 from main.
</content>
</entry>
<entry>
<title>[4.2.x] Added timeout-minutes directive to all GitHub Actions workflows.</title>
<updated>2025-11-26T13:05:32Z</updated>
<author>
<name>Natalia</name>
<email>124304+nessita@users.noreply.github.com</email>
</author>
<published>2025-11-26T01:18:50Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=7d7f27bc9881dede6337212db1e9ccdbd37addae'/>
<id>urn:sha1:7d7f27bc9881dede6337212db1e9ccdbd37addae</id>
<content type='text'>
GitHub Actions defaults to a 360-minute (6-hour) timeout. We've had jobs
hang due to issues in the parallel test runner, causing them to run for
the full 6 hours. This wastes resources and negatively impacts CI
availability, so explicit timeouts have been added to prevent
long-running hangs.

Backport of e48527f91d341c85a652499a5baaf725d36ae54f from main.
</content>
</entry>
<entry>
<title>[4.2.x] Added stub release notes and release date for 4.2.27.</title>
<updated>2025-11-25T18:21:18Z</updated>
<author>
<name>Natalia</name>
<email>124304+nessita@users.noreply.github.com</email>
</author>
<published>2025-11-18T16:13:31Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=b40c057c2585d0bc62a7e1c4cd96969ed9acf556'/>
<id>urn:sha1:b40c057c2585d0bc62a7e1c4cd96969ed9acf556</id>
<content type='text'>
Backport of d62e811acfc6a056e847bfcc460092a98511ed00 from main.
</content>
</entry>
<entry>
<title>[4.2.x] Configured dangerous-triggers zizmor rule.</title>
<updated>2025-11-21T20:06:02Z</updated>
<author>
<name>Jacob Walls</name>
<email>jacobtylerwalls@gmail.com</email>
</author>
<published>2025-11-14T19:06:21Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=b794e741296474955742a6af6f8ff86108e72df8'/>
<id>urn:sha1:b794e741296474955742a6af6f8ff86108e72df8</id>
<content type='text'>
Backport of 846613e521104fa2f2e1c2023e4a1a9886a2ff48 from main.
</content>
</entry>
<entry>
<title>[4.2.x] Addressed unpinned-uses zizmor finding.</title>
<updated>2025-11-21T20:01:37Z</updated>
<author>
<name>Jacob Walls</name>
<email>jacobtylerwalls@gmail.com</email>
</author>
<published>2025-11-14T18:58:40Z</published>
<link rel='alternate' type='text/html' href='http://cgit.adnoto.dev/django.git/commit/?id=6a803907407780f717f30663b2ae3bad43d7ac54'/>
<id>urn:sha1:6a803907407780f717f30663b2ae3bad43d7ac54</id>
<content type='text'>
Backport of 86b8058b40145fb5ba4fd859676225f533eca986 from main.
</content>
</entry>
</feed>
