First published: Mon Feb 13 2023(Updated: )
A memory exhaustion flaw was found in the python-django package. This issue occurs when passing certain inputs, leading to a system crash and denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/automation-controller | <0:4.4.2-1.el8a | 0:4.4.2-1.el8a |
redhat/automation-controller | <0:4.4.2-1.el9a | 0:4.4.2-1.el9a |
redhat/python-django | <0:3.2.18-1.el8 | 0:3.2.18-1.el8 |
redhat/python-django | <0:3.2.18-1.0.1.el8 | 0:3.2.18-1.0.1.el8 |
Djangoproject Django | >=3.2<3.2.18 | |
Djangoproject Django | >=4.0<4.0.10 | |
Djangoproject Django | >=4.1<4.1.7 | |
Debian Debian Linux | =10.0 | |
redhat/python-django | <4.1.7 | 4.1.7 |
redhat/python-django | <4.0.10 | 4.0.10 |
redhat/python-django | <3.2.18 | 3.2.18 |
pip/Django | >=4.0a1<4.0.10 | 4.0.10 |
pip/Django | >=4.1a1<4.1.7 | 4.1.7 |
pip/Django | >=3.2a1<3.2.18 | 3.2.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this issue is CVE-2023-24580.
The severity of CVE-2023-24580 is high.
Versions 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7 of python-django are affected.
This vulnerability can be exploited by passing certain inputs (e.g., an excessive number of parts) to multipart forms.
You can find more information about this vulnerability on the following links: - [https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2169743](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2169743) - [https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2169745](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2169745) - [https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2169742](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2169742)