python3-django: Fix CVE-2023-23969

In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values
of Accept-Language headers are cached in order to avoid repetitive parsing. This leads
to a potential denial-of-service vector via excessive memory usage if the raw value of
Accept-Language headers is very large.

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-23969

Upstream-patch:
https://github.com/django/django/commit/c7e0151fdf33e1b11d488b6f67b94fdf3a30614a

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
This commit is contained in:
Soumya Sambu
2025-01-10 13:17:55 +00:00
committed by Armin Kuster
parent 59ebd5b114
commit e13c721bed
2 changed files with 109 additions and 0 deletions
@@ -13,6 +13,7 @@ SRC_URI += "file://CVE-2023-31047.patch \
file://CVE-2024-24680.patch \
file://CVE-2024-42005.patch \
file://CVE-2024-38875.patch \
file://CVE-2023-23969.patch \
"
SRC_URI[sha256sum] = "0200b657afbf1bc08003845ddda053c7641b9b24951e52acd51f6abda33a7413"