First published: Tue Sep 03 2024(Updated: )
It was discovered that Django incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-45230) It was discovered that Django incorrectly handled certain email sending failures. A remote attacker could possibly use this issue to enumerate user emails by issuing password reset requests and observing the outcomes. (CVE-2024-45231)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3-django | <3:4.2.11-1ubuntu1.3 | 3:4.2.11-1ubuntu1.3 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/python3-django | <2:3.2.12-2ubuntu1.14 | 2:3.2.12-2ubuntu1.14 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/python3-django | <2:2.2.12-1ubuntu0.25 | 2:2.2.12-1ubuntu0.25 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/python-django | <1:1.11.11-1ubuntu1.21+esm7 | 1:1.11.11-1ubuntu1.21+esm7 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/python3-django | <1:1.11.11-1ubuntu1.21+esm7 | 1:1.11.11-1ubuntu1.21+esm7 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6987-1 is categorized as a potential denial of service vulnerability which could affect the application's availability.
To resolve USN-6987-1, update to the patched version of Python Django as recommended for your specific Ubuntu release.
USN-6987-1 affects multiple versions of Python Django across Ubuntu 18.04, 20.04, 22.04, and 24.04.
Any user or organization running vulnerable versions of Python Django on the specified Ubuntu versions is at risk.
If an immediate update is not feasible due to operational requirements, implement workarounds or increase monitoring to detect potential exploitation.