mirror of
https://github.com/django/django.git
synced 2025-10-31 09:41:08 +00:00
Fixed CVE-2023-23969 -- Prevented DoS with pathological values for Accept-Language.
The parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large. Accept-Language headers are now limited to a maximum length in order to avoid this issue.
This commit is contained in:
committed by
Mariusz Felisiak
parent
110b3b8356
commit
8c660fb592
@@ -6,4 +6,12 @@ Django 3.2.17 release notes
|
||||
|
||||
Django 3.2.17 fixes a security issue with severity "moderate" in 3.2.16.
|
||||
|
||||
...
|
||||
CVE-2023-23969: Potential denial-of-service via ``Accept-Language`` headers
|
||||
===========================================================================
|
||||
|
||||
The parsed values of ``Accept-Language`` headers are cached in order to avoid
|
||||
repetitive parsing. This leads to a potential denial-of-service vector via
|
||||
excessive memory usage if large header values are sent.
|
||||
|
||||
In order to avoid this vulnerability, the ``Accept-Language`` header is now
|
||||
parsed up to a maximum length.
|
||||
|
||||
Reference in New Issue
Block a user