Fix CVE-2023-43665 (#14561)

This commit is contained in:
Hao Liu 2023-10-12 14:00:32 -04:00 committed by GitHub
parent 56878b4910
commit e9bd99c1ff
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 2 additions and 15 deletions

View File

@ -49,19 +49,6 @@ Make sure to delete the old tarball if it is an upgrade.
Anything pinned in `*.in` files involves additional manual work in
order to upgrade. Some information related to that work is outlined here.
### Django
For any upgrade of Django, it must be confirmed that
we don't regress on FIPS support before merging.
See internal integration test knowledge base article `how_to_test_FIPS`
for instructions.
If operating in a FIPS environment, `hashlib.md5()` will raise a `ValueError`,
but will support the `usedforsecurity` keyword on RHEL and Centos systems.
This used to be a problem with `names_digest` function in Django, but
was fixed upstream in Django 4.1.
### django-split-settings
When we attemed to upgrade past 1.0.0 the build process in GitHub failed on the docker build step with the following error:

View File

@ -12,7 +12,7 @@ cryptography>=41.0.2 # CVE-2023-38325
Cython<3 # Since the bump to PyYAML 5.4.1 this is now a mandatory dep
daphne
distro
django==4.2.5 # see UPGRADE BLOCKERs, CVE-2023-41164
django==4.2.6 # CVE-2023-43665
django-auth-ldap
django-cors-headers
django-crum

View File

@ -101,7 +101,7 @@ deprecated==1.2.13
# via jwcrypto
distro==1.8.0
# via -r /awx_devel/requirements/requirements.in
django==4.2.5
django==4.2.6
# via
# -r /awx_devel/requirements/requirements.in
# channels