summaryrefslogtreecommitdiff
path: root/docs/releases/3.2.17.txt
diff options
context:
space:
mode:
authorNick Pope <nick@nickpope.me.uk>2023-01-25 12:21:48 +0100
committerMariusz Felisiak <felisiak.mariusz@gmail.com>2023-02-01 09:44:04 +0100
commit8c660fb59239828583f17cdede3b64f208b8752c (patch)
tree443edc779e626ff26d94fd9652c5c504db572136 /docs/releases/3.2.17.txt
parent110b3b83567da22f19ec04210db134d0fe83d662 (diff)
Fixed CVE-2023-23969 -- Prevented DoS with pathological values for Accept-Language.
The parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large. Accept-Language headers are now limited to a maximum length in order to avoid this issue.
Diffstat (limited to 'docs/releases/3.2.17.txt')
-rw-r--r--docs/releases/3.2.17.txt10
1 files changed, 9 insertions, 1 deletions
diff --git a/docs/releases/3.2.17.txt b/docs/releases/3.2.17.txt
index 9eba24d72f..fcc097c5cc 100644
--- a/docs/releases/3.2.17.txt
+++ b/docs/releases/3.2.17.txt
@@ -6,4 +6,12 @@ Django 3.2.17 release notes
Django 3.2.17 fixes a security issue with severity "moderate" in 3.2.16.
-...
+CVE-2023-23969: Potential denial-of-service via ``Accept-Language`` headers
+===========================================================================
+
+The parsed values of ``Accept-Language`` headers are cached in order to avoid
+repetitive parsing. This leads to a potential denial-of-service vector via
+excessive memory usage if large header values are sent.
+
+In order to avoid this vulnerability, the ``Accept-Language`` header is now
+parsed up to a maximum length.