OESA-2024-1167

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1167
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-1167.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-1167
Upstream
Published
2024-02-23T11:06:58Z
Modified
2025-08-12T05:25:21.330217Z
Summary
python-django security update
Details

Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Security Fix(es):

An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.(CVE-2024-24680)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP3 / python-django

Package

Name
python-django
Purl
pkg:rpm/openEuler/python-django&distro=openEuler-22.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.12-9.oe2203sp3

Ecosystem specific

{
    "src": [
        "python-django-3.2.12-9.oe2203sp3.src.rpm"
    ],
    "noarch": [
        "python-django-help-3.2.12-9.oe2203sp3.noarch.rpm",
        "python3-Django-3.2.12-9.oe2203sp3.noarch.rpm"
    ]
}