2024-07-03 19:09:34 +02:00
|
|
|
===========================
|
|
|
|
Django 4.2.14 release notes
|
|
|
|
===========================
|
|
|
|
|
|
|
|
*July 9, 2024*
|
|
|
|
|
|
|
|
Django 4.2.14 fixes two security issues with severity "moderate" and two
|
|
|
|
security issues with severity "low" in 4.2.13.
|
|
|
|
|
2024-06-24 15:30:59 +02:00
|
|
|
CVE-2024-38875: Potential denial-of-service vulnerability in ``django.utils.html.urlize()``
|
|
|
|
===========================================================================================
|
|
|
|
|
|
|
|
:tfilter:`urlize` and :tfilter:`urlizetrunc` were subject to a potential
|
|
|
|
denial-of-service attack via certain inputs with a very large number of
|
|
|
|
brackets.
|
2024-06-15 04:12:58 +02:00
|
|
|
|
|
|
|
CVE-2024-39329: Username enumeration through timing difference for users with unusable passwords
|
|
|
|
================================================================================================
|
|
|
|
|
|
|
|
The :meth:`~django.contrib.auth.backends.ModelBackend.authenticate()` method
|
|
|
|
allowed remote attackers to enumerate users via a timing attack involving login
|
|
|
|
requests for users with unusable passwords.
|