First published: Wed Nov 13 2024(Updated: )
Django is a high-level Python Web framework that encourages rapid<br>development and a clean, pragmatic design. It focuses on automating as much<br>as possible and adhering to the DRY (Don't Repeat Yourself) principle.<br>Security Fix(es):<br><li> Potential denial-of-service in django.utils.html.urlize()</li> (CVE-2024-38875)<br><li> Potential denial-of-service in</li> django.utils.translation.get_supported_language_variant() (CVE-2024-39614)<br><li> Username enumeration through timing difference for users with unusable</li> passwords (CVE-2024-39329)<br><li> Potential directory-traversal in django.core.files.storage.Storage.save()</li> (CVE-2024-39330)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat OpenStack Services on OpenShift | ||
redhat/python-django | <3.2.12-8.el9 | 3.2.12-8.el9 |
redhat/python3-django | <3.2.12-8.el9 | 3.2.12-8.el9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:9481 is classified as having potential denial-of-service vulnerabilities.
You can fix RHSA-2024:9481 by updating to the specified version 3.2.12-8.el9 of python-django or python3-django.
The affected software includes Red Hat OpenStack Services on OpenShift as well as specific versions of the python-django and python3-django packages.
RHSA-2024:9481 was released in response to security vulnerabilities discovered in the Django framework.
Support for RHSA-2024:9481 can be obtained from Red Hat through their advisory and support channels.