DEBIAN-CVE-2024-56374

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2024-56374
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-56374.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-56374
Upstream
Published
2025-01-14T19:15:32Z
Modified
2025-09-19T07:35:23.980151Z
Summary
[none]
Details

An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions cleanipv6address and isvalidipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)

References

Affected packages

Debian:11 / python-django

Package

Name
python-django
Purl
pkg:deb/debian/python-django?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.2.28-1~deb11u5

Affected versions

2:2.*

2:2.2.24-1
2:2.2.25-1~deb11u1
2:2.2.26-1~deb11u1
2:2.2.28-1~deb11u1
2:2.2.28-1~deb11u2
2:2.2.28-1~deb11u3
2:2.2.28-1~deb11u4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / python-django

Package

Name
python-django
Purl
pkg:deb/debian/python-django?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:4.2.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / python-django

Package

Name
python-django
Purl
pkg:deb/debian/python-django?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:4.2.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}