CVE-2024-56374

Publication date 14 January 2025

Last updated 23 January 2025


Ubuntu priority

An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)

Status

Package Ubuntu Release Status
python-django 24.10 oracular
Fixed 3:4.2.15-1ubuntu1.2
24.04 LTS noble
Fixed 3:4.2.11-1ubuntu1.5
22.04 LTS jammy
Fixed 2:3.2.12-2ubuntu1.16
20.04 LTS focal
Fixed 2:2.2.12-1ubuntu0.27
18.04 LTS bionic
16.04 LTS xenial
Needs evaluation

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro

References

Related Ubuntu Security Notices (USN)

Other references