Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency django to v3.2.23 [security] - autoclosed #346

Closed
wants to merge 1 commit into from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Oct 1, 2022

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
Django (source, changelog) ==3.2.14 -> ==3.2.23 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2022-36359

An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.

CVE-2023-36053

In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.

CVE-2023-24580

An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.

CVE-2023-31047

In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's "Uploading multiple files" documentation suggested otherwise.

CVE-2023-46695

An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.


Release Notes

django/django (Django)

v3.2.23

Compare Source

v3.2.22

Compare Source

v3.2.21

Compare Source

v3.2.20

Compare Source

v3.2.19

Compare Source

v3.2.18

Compare Source

v3.2.17

Compare Source

v3.2.16

Compare Source

v3.2.15

Compare Source


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@webteam-app
Copy link
Collaborator

Demo starting at https://docs-ubuntu-com-346.demos.haus

@codecov-commenter
Copy link

codecov-commenter commented Oct 1, 2022

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 87.27%. Comparing base (ac63dfd) to head (4250f0d).
Report is 1 commits behind head on main.

Additional details and impacted files
@@           Coverage Diff           @@
##             main     #346   +/-   ##
=======================================
  Coverage   87.27%   87.27%           
=======================================
  Files           5        5           
  Lines          55       55           
=======================================
  Hits           48       48           
  Misses          7        7           
Flag Coverage Δ
python 87.27% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@renovate renovate bot changed the title Update dependency Django to v3.2.15 [SECURITY] Update dependency Django to v3.2.18 [SECURITY] Mar 16, 2023
@renovate renovate bot force-pushed the renovate/pypi-Django-vulnerability branch from 8906e84 to bd39ba7 Compare March 16, 2023 13:23
@renovate renovate bot force-pushed the renovate/pypi-Django-vulnerability branch from bd39ba7 to 3c45cf9 Compare May 9, 2023 23:32
@renovate renovate bot changed the title Update dependency Django to v3.2.18 [SECURITY] Update dependency Django to v3.2.19 [SECURITY] May 9, 2023
@renovate renovate bot changed the title Update dependency Django to v3.2.19 [SECURITY] Update dependency Django to v3.2.20 [SECURITY] Jul 6, 2023
@renovate renovate bot force-pushed the renovate/pypi-Django-vulnerability branch from 3c45cf9 to 98a8995 Compare July 6, 2023 00:38
@renovate renovate bot changed the title Update dependency Django to v3.2.20 [SECURITY] Update dependency Django to v3.2.20 [SECURITY] - autoclosed Apr 3, 2024
@renovate renovate bot closed this Apr 3, 2024
@renovate renovate bot deleted the renovate/pypi-Django-vulnerability branch April 3, 2024 13:16
@renovate renovate bot changed the title Update dependency Django to v3.2.20 [SECURITY] - autoclosed Update dependency Django to v3.2.20 [SECURITY] Apr 3, 2024
@renovate renovate bot reopened this Apr 3, 2024
@renovate renovate bot restored the renovate/pypi-Django-vulnerability branch April 3, 2024 17:36
@renovate renovate bot force-pushed the renovate/pypi-Django-vulnerability branch from 98a8995 to 4250f0d Compare April 3, 2024 17:36
@renovate renovate bot changed the title Update dependency Django to v3.2.20 [SECURITY] Update dependency Django to v3.2.23 [SECURITY] Apr 3, 2024
@renovate renovate bot changed the title Update dependency Django to v3.2.23 [SECURITY] chore(deps): update dependency django to v3.2.23 [security] Jun 28, 2024
@renovate renovate bot changed the title chore(deps): update dependency django to v3.2.23 [security] chore(deps): update dependency django to v3.2.23 [security] - autoclosed Aug 6, 2024
@renovate renovate bot closed this Aug 6, 2024
@renovate renovate bot deleted the renovate/pypi-Django-vulnerability branch August 6, 2024 09:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants