CVE Vulnerabilities

CVE-2024-39614

Improper Handling of Length Parameter Inconsistency

Published: Jul 10, 2024 | Modified: Aug 01, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM

An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_language_variant() was subject to a potential denial-of-service attack when used with very long strings containing specific characters.

Weakness

The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.

Affected Software

Name Vendor Start Version End Version
Python-django Ubuntu esm-infra/bionic *
Python-django Ubuntu focal *
Python-django Ubuntu jammy *
Python-django Ubuntu mantic *
Python-django Ubuntu noble *
Python-django Ubuntu trusty/esm *
Red Hat Ansible Automation Platform 2.4 for RHEL 8 RedHat python3x-django-0:4.2.15-1.el8ap *
Red Hat Ansible Automation Platform 2.4 for RHEL 9 RedHat python-django-0:4.2.15-1.el9ap *
Red Hat OpenStack Services on OpenShift 18.0 RedHat python-django-0:3.2.12-8.el9ost *
Red Hat Satellite 6.16 for RHEL 8 RedHat python-django-0:4.2.16-1.el8pc *
Red Hat Satellite 6.16 for RHEL 8 RedHat python-django-0:4.2.16-1.el8pc *
Red Hat Satellite 6.16 for RHEL 9 RedHat python-django-0:4.2.16-1.el9pc *
Red Hat Satellite 6.16 for RHEL 9 RedHat python-django-0:4.2.16-1.el9pc *

Potential Mitigations

References