{"id":"USN-6888-2","summary":"python-django vulnerabilities","details":"USN-6888-1 fixed several vulnerabilities in Django. This update provides\nthe corresponding update for Ubuntu 18.04 LTS.\n\nOriginal advisory details:\n\n Elias Myllymäki discovered that Django incorrectly handled certain inputs\n with a large number of brackets. A remote attacker could possibly use this\n issue to cause Django to consume resources or stop responding, resulting in\n a denial of service. (CVE-2024-38875)\n\n It was discovered that Django incorrectly handled authenticating users with\n unusable passwords. A remote attacker could possibly use this issue to\n perform a timing attack and enumerate users. (CVE-2024-39329)\n\n Josh Schneier discovered that Django incorrectly handled file path\n validation when the storage class is being derived. A remote attacker could\n possibly use this issue to save files into arbitrary directories.\n (CVE-2024-39330)\n\n It was discovered that Django incorrectly handled certain long strings that\n included a specific set of characters. A remote attacker could possibly use\n this issue to cause Django to consume resources or stop responding,\n resulting in a denial of service. (CVE-2024-39614)\n","modified":"2026-04-27T16:59:06.968152Z","published":"2024-07-11T10:41:49Z","related":["UBUNTU-CVE-2024-38875","UBUNTU-CVE-2024-39329","UBUNTU-CVE-2024-39330","UBUNTU-CVE-2024-39614"],"upstream":["CVE-2024-38875","CVE-2024-39329","CVE-2024-39330","CVE-2024-39614","UBUNTU-CVE-2024-38875","UBUNTU-CVE-2024-39329","UBUNTU-CVE-2024-39330","UBUNTU-CVE-2024-39614"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6888-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-38875"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39329"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39330"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39614"}],"affected":[{"package":{"name":"python-django","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/python-django@1:1.11.11-1ubuntu1.21+esm5?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.11.11-1ubuntu1.21+esm5"}]}],"versions":["1:1.11.4-1ubuntu1","1:1.11.6-1ubuntu1","1:1.11.9-1ubuntu1","1:1.11.11-1ubuntu1","1:1.11.11-1ubuntu1.1","1:1.11.11-1ubuntu1.2","1:1.11.11-1ubuntu1.3","1:1.11.11-1ubuntu1.4","1:1.11.11-1ubuntu1.5","1:1.11.11-1ubuntu1.6","1:1.11.11-1ubuntu1.7","1:1.11.11-1ubuntu1.8","1:1.11.11-1ubuntu1.9","1:1.11.11-1ubuntu1.10","1:1.11.11-1ubuntu1.11","1:1.11.11-1ubuntu1.12","1:1.11.11-1ubuntu1.13","1:1.11.11-1ubuntu1.14","1:1.11.11-1ubuntu1.15","1:1.11.11-1ubuntu1.16","1:1.11.11-1ubuntu1.17","1:1.11.11-1ubuntu1.18","1:1.11.11-1ubuntu1.19","1:1.11.11-1ubuntu1.20","1:1.11.11-1ubuntu1.21","1:1.11.11-1ubuntu1.21+esm1","1:1.11.11-1ubuntu1.21+esm2","1:1.11.11-1ubuntu1.21+esm3","1:1.11.11-1ubuntu1.21+esm4"],"ecosystem_specific":{"binaries":[{"binary_version":"1:1.11.11-1ubuntu1.21+esm5","binary_name":"python-django"},{"binary_version":"1:1.11.11-1ubuntu1.21+esm5","binary_name":"python-django-common"},{"binary_version":"1:1.11.11-1ubuntu1.21+esm5","binary_name":"python3-django"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6888-2.json","cves_map":{"cves":[{"id":"CVE-2024-38875","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-39329","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-39330","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-39614","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:18.04:LTS"}}}],"schema_version":"1.7.5"}