diff options
| author | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2023-10-17 11:48:32 +0200 |
|---|---|---|
| committer | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2023-11-01 06:19:20 +0100 |
| commit | 048a9ebb6ea468426cb4e57c71572cbbd975517f (patch) | |
| tree | 81e8da018997af0fc97d48f4a9c36f6b0d68688d /docs/releases/4.1.13.txt | |
| parent | 3fae5d92da84382483fe48cc62c1f57789b47196 (diff) | |
[4.2.x] Fixed CVE-2023-46695 -- Fixed potential DoS in UsernameField on Windows.
Thanks MProgrammer (https://hackerone.com/mprogrammer) for the report.
Diffstat (limited to 'docs/releases/4.1.13.txt')
| -rw-r--r-- | docs/releases/4.1.13.txt | 12 |
1 files changed, 11 insertions, 1 deletions
diff --git a/docs/releases/4.1.13.txt b/docs/releases/4.1.13.txt index c2fb5afcd3..01ad5dda62 100644 --- a/docs/releases/4.1.13.txt +++ b/docs/releases/4.1.13.txt @@ -6,4 +6,14 @@ Django 4.1.13 release notes Django 4.1.13 fixes a security issue with severity "moderate" in 4.1.12. -... +CVE-2023-46695: Potential denial of service vulnerability in ``UsernameField`` on Windows +========================================================================================= + +The :func:`NFKC normalization <python:unicodedata.normalize>` is slow on +Windows. As a consequence, ``django.contrib.auth.forms.UsernameField`` was +subject to a potential denial of service attack via certain inputs with a very +large number of Unicode characters. + +In order to avoid the vulnerability, invalid values longer than +``UsernameField.max_length`` are no longer normalized, since they cannot pass +validation anyway. |
