summaryrefslogtreecommitdiff
path: root/docs/releases/6.0.4.txt
diff options
context:
space:
mode:
authorNatalia <124304+nessita@users.noreply.github.com>2026-03-11 10:26:18 -0300
committerJacob Walls <jacobtylerwalls@gmail.com>2026-04-07 07:22:54 -0400
commit393dbc53e848876fdba92fbf02e10ee6a6eace6b (patch)
treef9f57d814549b88ccec34c4be0af429d855d7677 /docs/releases/6.0.4.txt
parent0910af60468216c856dfbcac1177372c225deb76 (diff)
[6.0.x] Fixed CVE-2026-33034 -- Enforced DATA_UPLOAD_MAX_MEMORY_SIZE on body size in ASGI requests.
The `body` property in `HttpRequest` checks DATA_UPLOAD_MAX_MEMORY_SIZE against the declared `Content-Length` header before reading. On the ASGI path, chunked requests carry no `Content-Length`, so the check evaluated to 0 and always passed regardless of the actual body size. This work adds a new check on the actual number of bytes consumed. Thanks to Superior for the report, and to Jake Howard and Jacob Walls for reviews. Backport of 953c238058c0ce387a1a41cb491bfc1875d73ad0 from main.
Diffstat (limited to 'docs/releases/6.0.4.txt')
-rw-r--r--docs/releases/6.0.4.txt11
1 files changed, 11 insertions, 0 deletions
diff --git a/docs/releases/6.0.4.txt b/docs/releases/6.0.4.txt
index 6452768f2a..f6a677d47b 100644
--- a/docs/releases/6.0.4.txt
+++ b/docs/releases/6.0.4.txt
@@ -57,6 +57,17 @@ may trigger repeated memory copying, potentially degrading performance.
This issue has severity "moderate" according to the :ref:`Django security
policy <security-disclosure>`.
+CVE-2026-33034: Potential denial-of-service vulnerability in ASGI requests via memory upload limit bypass
+=========================================================================================================
+
+ASGI requests with a missing or understated ``Content-Length`` header could
+bypass the :setting:`DATA_UPLOAD_MAX_MEMORY_SIZE` limit when reading
+``HttpRequest.body``, potentially loading an unbounded request body into
+memory and causing service degradation.
+
+This issue has severity "low" according to the :ref:`Django security policy
+<security-disclosure>`.
+
Bugfixes
========