https://www.djangoproject.com/weblog/2025/jan/14/security-releases/

In accordance with `our security release policy
<https://docs.djangoproject.com/en/dev/internals/security/>`_, the Django
team
is issuing releases for
`Django 5.1.5 <https://docs.djangoproject.com/en/dev/releases/5.1.5/>`_,
`Django 5.0.11 <https://docs.djangoproject.com/en/dev/releases/5.0.11/>`_,
and
`Django 4.2.18 <https://docs.djangoproject.com/en/dev/releases/4.2.18/>`_.
These releases address the security issues detailed below. We encourage all
users of Django to upgrade as soon as possible.

CVE-2024-56374: Potential denial-of-service vulnerability in IPv6 validation
============================================================================

Lack of upper bound limit enforcement in strings passed when performing IPv6
validation could lead to a potential denial-of-service attack. The
undocumented
and private functions ``clean_ipv6_address`` and ``is_valid_ipv6_address``
were
vulnerable, as was the ``django.forms.GenericIPAddressField`` form field,
which has now been updated to define a ``max_length`` of 39 characters.

The ``django.db.models.GenericIPAddressField`` model field was not affected.

Thanks to Saravana Kumar for the report.

This issue has severity "moderate" according to the Django security policy.


Affected supported versions
===========================

* Django main
* Django 5.1
* Django 5.0
* Django 4.2

Resolution
==========

Patches to resolve the issue have been applied to Django's
main, 5.1, 5.0, and 4.2 branches.
The patches may be obtained from the following changesets.

CVE-2024-56374: Potential denial-of-service vulnerability in IPv6 validation
----------------------------------------------------------------------------

* On the `main branch <
https://github.com/django/django/commit/ca2be7724e1244a4cb723de40a070f873c6e94bf
>`__
* On the `5.1 branch <
https://github.com/django/django/commit/4806731e58f3e8700a3c802e77899d54ac6021fe
>`__
* On the `5.0 branch <
https://github.com/django/django/commit/e8d4a2005955dcf962193600b53bf461b190b455
>`__
* On the `4.2 branch <
https://github.com/django/django/commit/ad866a1ca3e7d60da888d25d27e46a8adb2ed36e
>`__


The following releases have been issued
=======================================

* Django 5.1.5 (`download Django 5.1.5
  <https://www.djangoproject.com/m/releases/5.1/Django-5.1.5.tar.gz>`_ |
  `5.1.5 checksums
  <https://www.djangoproject.com/m/pgp/Django-5.1.5.checksum.txt>`_)
* Django 5.0.11 (`download Django 5.0.11
  <https://www.djangoproject.com/m/releases/5.0/Django-5.0.11.tar.gz>`_ |
  `5.0.11 checksums
  <https://www.djangoproject.com/m/pgp/Django-5.0.11.checksum.txt>`_)
* Django 4.2.18 (`download Django 4.2.18
  <https://www.djangoproject.com/m/releases/4.2/Django-4.2.18.tar.gz>`_ |
  `4.2.18 checksums
  <https://www.djangoproject.com/m/pgp/Django-4.2.18.checksum.txt>`_)

The PGP key ID used for this release is Natalia Bidart: `2EE82A8D9470983E <
https://github.com/nessita.gpg>`_

General notes regarding security reporting
==========================================

As always, we ask that potential security issues be reported via private
email
to ``secur...@djangoproject.com``, and not via Django's Trac instance, nor
via
the Django Forum, nor via the django-developers list. Please see `our
security
policies <https://www.djangoproject.com/security/>`_ for further
information.

Reply via email to