Bugzilla – Bug 1227590
VUL-0: CVE-2024-38875: python-Django: potential denial-of-service through django.utils.html.urlize()
Last modified: 2024-07-17 18:15:02 UTC
CVE-2024-38875: Potential denial-of-service in django.utils.html.urlize() ========================================================================= ``urlize()`` and ``urlizetrunc()`` were subject to a potential denial-of-service attack via certain inputs with a very large number of brackets. Thanks to Elias Myllymäki for the report. This issue has severity "moderate" according to the Django security policy. Affected supported versions =========================== * Django main branch * Django 5.1 (currently at beta status) * Django 5.0 * Django 4.2 Resolution ========== Patches to resolve the issue have been applied to Django's main, 5.1, 5.0, and 4.2 branches. The patches may be obtained from the following changesets. CVE-2024-38875: Potential denial-of-service in django.utils.html.urlize() ------------------------------------------------------------------------- * On the `main branch < https://github.com/django/django/commit/d6664574539c1531612dea833d264ed5c2b04e1e * On the `5.1 branch < https://github.com/django/django/commit/44aef996c8d723198e89ca834cb1d746e2e72d77 * On the `5.0 branch < https://github.com/django/django/commit/7285644640f085f41d60ab0c8ae4e9153f0485db * On the `4.2 branch < https://github.com/django/django/commit/79f368764295df109a37192f6182fb6f361d85b5 The following releases have been issued ======================================= * Django 5.0.7 (`download Django 5.0.7 <https://www.djangoproject.com/m/releases/5.0/Django-5.0.7.tar.gz>`_ | `5.0.7 checksums <https://www.djangoproject.com/m/pgp/Django-5.0.7.checksum.txt>`_) * Django 4.2.14 (`download Django 4.2.14 <https://www.djangoproject.com/m/releases/4.2/Django-4.2.14.tar.gz>`_ | `4.2.14 checksums <https://www.djangoproject.com/m/pgp/Django-4.2.14.checksum.txt>`_) The PGP key ID used for this release is Natalia Bidart: `2EE82A8D9470983E < https://github.com/nessita.gpg>`_ References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-38875 https://seclists.org/oss-sec/2024/q3/39 https://github.com/django/django/commit/7285644640f085f41d60ab0c8ae4e9153f0485db https://github.com/django/django/commit/79f368764295df109a37192f6182fb6f361d85b5 https://github.com/django/django/commit/44aef996c8d723198e89ca834cb1d746e2e72d77 https://github.com/django/django/commit/d6664574539c1531612dea833d264ed5c2b04e1e
SUSE-SU-2024:2545-1: An update that solves five vulnerabilities can now be installed. Category: security (important) Bug References: 1207565, 1227590, 1227593, 1227594, 1227595 CVE References: CVE-2023-23969, CVE-2024-38875, CVE-2024-39329, CVE-2024-39330, CVE-2024-39614 Maintenance Incident: [SUSE:Maintenance:34811](https://smelt.suse.de/incident/34811/) Sources used: openSUSE Leap 15.5 (src): python-Django-2.0.7-150000.1.20.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1227590) was mentioned in https://build.opensuse.org/request/show/1188243 Factory / python-Django