mirror of
https://github.com/django/django.git
synced 2024-12-24 10:05:46 +00:00
05ba4130ee
Thanks MProgrammer (https://hackerone.com/mprogrammer) for the report.
20 lines
785 B
Plaintext
20 lines
785 B
Plaintext
===========================
|
|
Django 3.2.23 release notes
|
|
===========================
|
|
|
|
*November 1, 2023*
|
|
|
|
Django 3.2.23 fixes a security issue with severity "moderate" in 3.2.22.
|
|
|
|
CVE-2023-46695: Potential denial of service vulnerability in ``UsernameField`` on Windows
|
|
=========================================================================================
|
|
|
|
The :func:`NFKC normalization <python:unicodedata.normalize>` is slow on
|
|
Windows. As a consequence, ``django.contrib.auth.forms.UsernameField`` was
|
|
subject to a potential denial of service attack via certain inputs with a very
|
|
large number of Unicode characters.
|
|
|
|
In order to avoid the vulnerability, invalid values longer than
|
|
``UsernameField.max_length`` are no longer normalized, since they cannot pass
|
|
validation anyway.
|