Bugzilla – Bug 1227593
VUL-0: CVE-2024-39329: python-Django: username enumeration through timing difference for users with unusable passwords
Last modified: 2024-07-17 18:15:03 UTC
CVE-2024-39329: Username enumeration through timing difference for users with unusable passwords ================================================================================================ The ``django.contrib.auth.backends.ModelBackend.authenticate()`` method allowed remote attackers to enumerate users via a timing attack involving login requests for users with unusable passwords. This issue has severity "low" according to the Django security policy. Affected supported versions =========================== * Django main branch * Django 5.1 (currently at beta status) * Django 5.0 * Django 4.2 Resolution ========== Patches to resolve the issue have been applied to Django's main, 5.1, 5.0, and 4.2 branches. The patches may be obtained from the following changesets. CVE-2024-39329: Username enumeration through timing difference for users with unusable passwords ------------------------------------------------------------------------------------------------ * On the `main branch < https://github.com/django/django/commit/5d8645857936c142a3973694799c52165e2bdcdb * On the `5.1 branch < https://github.com/django/django/commit/f5d16483f3abfd33e301fb5c2005b80bd6d05aaf * On the `5.0 branch < https://github.com/django/django/commit/07cefdee4a9d1fcd9a3a631cbd07c78defd1923b * On the `4.2 branch < https://github.com/django/django/commit/156d3186c96e3ec2ca73b8b25dc2ef366e38df14 The following releases have been issued ======================================= * Django 5.0.7 (`download Django 5.0.7 <https://www.djangoproject.com/m/releases/5.0/Django-5.0.7.tar.gz>`_ | `5.0.7 checksums <https://www.djangoproject.com/m/pgp/Django-5.0.7.checksum.txt>`_) * Django 4.2.14 (`download Django 4.2.14 <https://www.djangoproject.com/m/releases/4.2/Django-4.2.14.tar.gz>`_ | `4.2.14 checksums <https://www.djangoproject.com/m/pgp/Django-4.2.14.checksum.txt>`_) The PGP key ID used for this release is Natalia Bidart: `2EE82A8D9470983E < https://github.com/nessita.gpg>`_ References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-39329 https://seclists.org/oss-sec/2024/q3/39 https://github.com/django/django/commit/5d8645857936c142a3973694799c52165e2bdcdb https://github.com/django/django/commit/f5d16483f3abfd33e301fb5c2005b80bd6d05aaf https://github.com/django/django/commit/07cefdee4a9d1fcd9a3a631cbd07c78defd1923b https://github.com/django/django/commit/156d3186c96e3ec2ca73b8b25dc2ef366e38df14
SUSE-SU-2024:2545-1: An update that solves five vulnerabilities can now be installed. Category: security (important) Bug References: 1207565, 1227590, 1227593, 1227594, 1227595 CVE References: CVE-2023-23969, CVE-2024-38875, CVE-2024-39329, CVE-2024-39330, CVE-2024-39614 Maintenance Incident: [SUSE:Maintenance:34811](https://smelt.suse.de/incident/34811/) Sources used: openSUSE Leap 15.5 (src): python-Django-2.0.7-150000.1.20.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1227593) was mentioned in https://build.opensuse.org/request/show/1188243 Factory / python-Django