CVE Vulnerabilities

CVE-2024-39614

Improper Handling of Length Parameter Inconsistency

Published: Jul 10, 2024 | Modified: Nov 04, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_language_variant() was subject to a potential denial-of-service attack when used with very long strings containing specific characters.

Weakness

The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.

Affected Software

NameVendorStart VersionEnd Version
DjangoDjangoproject4.2 (including)4.2.14 (excluding)
DjangoDjangoproject5.0 (including)5.0.7 (excluding)
Red Hat Ansible Automation Platform 2.4 for RHEL 8RedHatansible-automation-platform-24/lightspeed-rhel8:1.0.2-10*
Red Hat Ansible Automation Platform 2.4 for RHEL 8RedHatautomation-controller-0:4.5.10-1.el8ap*
Red Hat Ansible Automation Platform 2.4 for RHEL 8RedHatpython3x-django-0:4.2.15-1.el8ap*
Red Hat Ansible Automation Platform 2.4 for RHEL 9RedHatautomation-controller-0:4.5.10-1.el9ap*
Red Hat Ansible Automation Platform 2.4 for RHEL 9RedHatpython-django-0:4.2.15-1.el9ap*
Red Hat OpenStack Services on OpenShift 18.0RedHatpython-django-0:3.2.12-8.el9ost*
Red Hat Satellite 6.16 for RHEL 8RedHatpython-django-0:4.2.16-1.el8pc*
Red Hat Satellite 6.16 for RHEL 8RedHatpython-django-0:4.2.16-1.el8pc*
Red Hat Satellite 6.16 for RHEL 9RedHatpython-django-0:4.2.16-1.el9pc*
Red Hat Satellite 6.16 for RHEL 9RedHatpython-django-0:4.2.16-1.el9pc*
RHUI 4 for RHEL 8RedHatpython-django-0:4.2.15-1.el8ui*
Python-djangoUbuntuesm-infra/bionic*
Python-djangoUbuntuesm-infra/focal*
Python-djangoUbuntufocal*
Python-djangoUbuntujammy*
Python-djangoUbuntumantic*
Python-djangoUbuntunoble*
Python-djangoUbuntutrusty/esm*

Potential Mitigations

References