First published: Fri Aug 02 2024(Updated: )
Description: urlize and urlizetrunc were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters. Affected versions ================= * Django main development branch * Django 5.1 (currently at release candidate status) * Django 5.0 * Django 4.2
Affected Software | Affected Version | How to fix |
---|---|---|
Django | <5.1 | |
Django | =5.0 | |
Django | =4.2 | |
Django | >5.1-RC<=5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2302434 is classified as high due to the potential for denial-of-service attacks.
To fix REDHAT-BUG-2302434, update your Django installation to the latest stable version where the vulnerability is resolved.
Django main development branch, Django 5.1 RC, Django 5.0, and Django 4.2 are affected by REDHAT-BUG-2302434.
REDHAT-BUG-2302434 is a denial-of-service vulnerability caused by handling very large input strings.
There is no official workaround for REDHAT-BUG-2302434; upgrading to a safe version is recommended.