Django is vulnerable to Denial Of Service (DoS). The vulnerability exists because trans_real.py
caches the Accept-Language
headers, allowing an attacker to cause an application crash via excessive memory usage if the value of the Accept-Language
headers are very large.
git://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-23969
docs.djangoproject.com/en/4.1/releases/security/
github.com/advisories/GHSA-q2jf-h9jm-m7p4
github.com/django/django/commit/4452642f193533e288a52c02efb5bbc766a68f95
github.com/django/django/commit/9d7bd5a56b1ce0576e8e07a8001373576d277942
github.com/django/django/commit/c7e0151fdf33e1b11d488b6f67b94fdf3a30614a
groups.google.com/forum/#!forum/django-announce
groups.google.com/forum/#%21forum/django-announce
lists.debian.org/debian-lts-announce/2023/02/msg00000.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
lists.fedoraproject.org/archives/list/[email protected]/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
lists.fedoraproject.org/archives/list/[email protected]/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
security.netapp.com/advisory/ntap-20230302-0007/
www.djangoproject.com/weblog/2023/feb/01/security-releases/