#20760: Account enumeration through timing attack in password verification in
django.contrib.auth
-------------------------------------+-------------------------------------
Reporter: jpaglier@… | Owner: Aymeric
| Augustin
Type: Bug | Status: closed
Component: contrib.auth | Version: 1.5
Severity: Normal | Resolution: fixed
Keywords: security | Triage Stage: Ready for
authentication timing enumeration | checkin
Has patch: 1 | Needs documentation: 0
Needs tests: 0 | Patch needs improvement: 0
Easy pickings: 0 | UI/UX: 0
-------------------------------------+-------------------------------------
Comment (by Natalia <124304+nessita@…>):
In [changeset:"07cefdee4a9d1fcd9a3a631cbd07c78defd1923b" 07cefde]:
{{{#!CommitTicketReference repository=""
revision="07cefdee4a9d1fcd9a3a631cbd07c78defd1923b"
[5.0.x] Fixed CVE-2024-39329 -- Standarized timing of verify_password()
when checking unusuable passwords.
Refs #20760.
Thanks Michael Manfre for the fix and to Adam Johnson for the review.
}}}
--
Ticket URL: <https://code.djangoproject.com/ticket/20760#comment:30>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.
--
You received this message because you are subscribed to the Google Groups
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/django-updates/0107019097d59d59-6c1efe68-38bf-489a-aa23-df67fb8cf642-000000%40eu-central-1.amazonses.com.