[Bug 357051] New: Django 0.96 i18n DoS

bugzilla at redhat.com bugzilla at redhat.com
Mon Oct 29 18:13:26 UTC 2007


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.




https://bugzilla.redhat.com/show_bug.cgi?id=357051

           Summary: Django 0.96 i18n DoS
           Product: Fedora
           Version: f7
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: low
          Priority: low
         Component: Django
        AssignedTo: michel.sylvan at gmail.com
        ReportedBy: ville.skytta at iki.fi
         QAContact: extras-qa at fedoraproject.org
                CC: fedora-security-list at redhat.com


http://www.djangoproject.com/weblog/2007/oct/26/security-fix/

"A per-process cache used by Django's internationalization ("i18n") system to
store the results of translation lookups for particular values of the HTTP
Accept-Language header used the full value of that header as a key. An attacker
could take advantage of this by sending repeated requests with extremely large
strings in the Accept-Language header, potentially causing a denial of service
by filling available memory.

Due to limitations imposed by Web server software on the size of HTTP header
fields, combined with reasonable limits on the number of requests which may be
handled by a single server process over its lifetime, this vulnerability may be
difficult to exploit. Additionally, it is only present when the "USE_I18N"
setting in Django is "True" and the i18n middleware component is enabled*.
Nonetheless, all users of affected versions of Django are encouraged to update."

All Fedora and EPEL branches are at 0.96 (which is vulnerable) at the moment.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.




More information about the security mailing list