Django 4.2.15 release notes¶
August 6, 2024
Django 4.2.15 fixes three security issues with severity "moderate", one security issue with severity "high", and a regression in 4.2.14.
CVE-2024-41989: Memory exhaustion in django.utils.numberformat.floatformat()
¶
If floatformat
received a string representation of a number in
scientific notation with a large exponent, it could lead to significant memory
consumption.
To avoid this, decimals with more than 200 digits are now returned as is.
CVE-2024-41990: Potential denial-of-service vulnerability in django.utils.html.urlize()
¶
urlize
and urlizetrunc
were subject to a potential
denial-of-service attack via very large inputs with a specific sequence of
characters.
CVE-2024-41991: Potential denial-of-service vulnerability in django.utils.html.urlize()
and AdminURLFieldWidget
¶
urlize
, urlizetrunc
, and AdminURLFieldWidget
were
subject to a potential denial-of-service attack via certain inputs with a very
large number of Unicode characters.
CVE-2024-42005: Potential SQL injection in QuerySet.values()
and values_list()
¶
QuerySet.values()
and values_list()
methods on models
with a JSONField
were subject to SQL injection in column aliases, via a
crafted JSON object key as a passed *arg
.
漏洞修复¶
Fixed a regression in Django 4.2.14 that caused a crash in
LocaleMiddleware
when processing a language code over 500 characters (#35627).