An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)
References
| Link | Resource |
|---|---|
| https://docs.djangoproject.com/en/dev/releases/security/ | Vendor Advisory |
| https://groups.google.com/g/django-announce | Vendor Advisory |
| https://www.djangoproject.com/weblog/2025/jan/14/security-releases/ | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2025/01/14/2 | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2025/01/msg00024.html | Third Party Advisory Mailing List |
Configurations
History
No history.
Information
Published : 2025-01-14 19:15
Updated : 2025-10-03 13:16
NVD link : CVE-2024-56374
Mitre link : CVE-2024-56374
CVE.ORG link : CVE-2024-56374
JSON object : View
Products Affected
djangoproject
- django
debian
- debian_linux
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
