From 82bbc2ebef088584cab0992e7abe909bf85e2065 Mon Sep 17 00:00:00 2001 From: github-actions Date: Tue, 14 Jan 2025 21:34:05 +0000 Subject: [PATCH] Assign IDs --- vulns/.id-allocator | 2 +- ...-CVE-2024-56374.yaml => PYSEC-2025-1.yaml} | 42 +++++++++---------- 2 files changed, 22 insertions(+), 22 deletions(-) rename vulns/django/{PYSEC-0000-CVE-2024-56374.yaml => PYSEC-2025-1.yaml} (86%) diff --git a/vulns/.id-allocator b/vulns/.id-allocator index 006500de..6e2e02b4 100644 --- a/vulns/.id-allocator +++ b/vulns/.id-allocator @@ -1 +1 @@ -4307cb4f84d0150d15fb29543443cad9b87f1edc2a48c840f74d0e8775148fdd \ No newline at end of file +790fdd56180984d5d1437ff1f474ab259f2c667ea80951ef8fdc2e88cb46dadd \ No newline at end of file diff --git a/vulns/django/PYSEC-0000-CVE-2024-56374.yaml b/vulns/django/PYSEC-2025-1.yaml similarity index 86% rename from vulns/django/PYSEC-0000-CVE-2024-56374.yaml rename to vulns/django/PYSEC-2025-1.yaml index ba543d53..3c3cf655 100644 --- a/vulns/django/PYSEC-0000-CVE-2024-56374.yaml +++ b/vulns/django/PYSEC-2025-1.yaml @@ -1,39 +1,30 @@ -id: PYSEC-0000-CVE-2024-56374 +id: PYSEC-2025-1 +modified: 2025-01-14T21:22:18.665005Z +published: 2025-01-14T19:15:32Z +aliases: +- CVE-2024-56374 details: An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.) -aliases: -- CVE-2024-56374 -modified: '2025-01-14T21:22:18.665005Z' -published: '2025-01-14T19:15:32Z' -references: -- type: ARTICLE - url: https://www.djangoproject.com/weblog/2025/jan/14/security-releases/ -- type: WEB - url: https://docs.djangoproject.com/en/dev/releases/security/ -- type: WEB - url: https://groups.google.com/g/django-announce -- type: WEB - url: http://www.openwall.com/lists/oss-security/2025/01/14/2 affected: - package: - name: django ecosystem: PyPI + name: django purl: pkg:pypi/django ranges: - type: ECOSYSTEM events: - - introduced: '5.1' + - introduced: "5.1" - fixed: 5.1.5 - - introduced: '5.0' + - introduced: "5.0" - fixed: 5.0.11 - - introduced: '4.2' + - introduced: "4.2" - fixed: 4.2.18 versions: - - '4.2' + - "4.2" - 4.2.1 - 4.2.10 - 4.2.11 @@ -51,7 +42,7 @@ affected: - 4.2.7 - 4.2.8 - 4.2.9 - - '5.0' + - "5.0" - 5.0.1 - 5.0.10 - 5.0.2 @@ -62,8 +53,17 @@ affected: - 5.0.7 - 5.0.8 - 5.0.9 - - '5.1' + - "5.1" - 5.1.1 - 5.1.2 - 5.1.3 - 5.1.4 +references: +- type: ARTICLE + url: https://www.djangoproject.com/weblog/2025/jan/14/security-releases/ +- type: WEB + url: https://docs.djangoproject.com/en/dev/releases/security/ +- type: WEB + url: https://groups.google.com/g/django-announce +- type: WEB + url: http://www.openwall.com/lists/oss-security/2025/01/14/2