diff options
| author | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2023-02-01 12:09:03 +0100 |
|---|---|---|
| committer | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2023-02-01 12:10:18 +0100 |
| commit | 9ac634ff26806ed64ef69acad1f1c44cfd158dc6 (patch) | |
| tree | 355db0889250961f59e6dd208ebfd7f4c7fd9c75 | |
| parent | f3b6a4f1f3f9edbed805e62f070221a5eb163d1a (diff) | |
[4.1.x] Added CVE-2023-23969 to security archive.
Backport of 36e3eef7d5a4c88671d20a561788679d0d9c334c from main
| -rw-r--r-- | docs/releases/security.txt | 10 |
1 files changed, 10 insertions, 0 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt index 940f91fa0f..0023fed03f 100644 --- a/docs/releases/security.txt +++ b/docs/releases/security.txt @@ -36,6 +36,16 @@ Issues under Django's security process All security issues have been handled under versions of Django's security process. These are listed below. +February 1, 2023 - :cve:`2023-23969` +------------------------------------ + +Potential denial-of-service via ``Accept-Language`` headers. `Full description +<https://www.djangoproject.com/weblog/2023/feb/01/security-releases/>`__ + +* Django 4.1 :commit:`(patch) <9d7bd5a56b1ce0576e8e07a8001373576d277942>` +* Django 4.0 :commit:`(patch) <4452642f193533e288a52c02efb5bbc766a68f95>` +* Django 3.2 :commit:`(patch) <c7e0151fdf33e1b11d488b6f67b94fdf3a30614a>` + October 4, 2022 - :cve:`2022-41323` ----------------------------------- |
