summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-django/CVE-2024-42005.patch
diff options
context:
space:
mode:
authorSoumya Sambu <soumya.sambu@windriver.com>2025-01-10 13:17:55 +0000
committerArmin Kuster <akuster808@gmail.com>2025-01-22 19:20:09 -0500
commite13c721bed30ec9ab67a6c802314b3fb2cd97831 (patch)
treec735d5063d6409990e8bdcc6dbd7d952709289eb /meta-python/recipes-devtools/python/python3-django/CVE-2024-42005.patch
parent59ebd5b114dc6215e24a48991bd28f7320b7a055 (diff)
downloadmeta-openembedded-e13c721bed30ec9ab67a6c802314b3fb2cd97831.tar.gz
python3-django: Fix CVE-2023-23969
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large. References: https://nvd.nist.gov/vuln/detail/CVE-2023-23969 Upstream-patch: https://github.com/django/django/commit/c7e0151fdf33e1b11d488b6f67b94fdf3a30614a Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-django/CVE-2024-42005.patch')
0 files changed, 0 insertions, 0 deletions