Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 197188 (CVE-2007-5712) - dev-python/django < 0.96.1 Potential Accept-Language header DoS (CVE-2007-5712)
Summary: dev-python/django < 0.96.1 Potential Accept-Language header DoS (CVE-2007-5712)
Status: RESOLVED FIXED
Alias: CVE-2007-5712
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High trivial (vote)
Assignee: Gentoo Security
URL: http://www.djangoproject.com/weblog/2...
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2007-10-27 00:46 UTC by Jan Meier
Modified: 2007-10-31 01:11 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jan Meier 2007-10-27 00:46:56 UTC
From the security page (http://www.djangoproject.com/weblog/2007/oct/26/security-fix/):

Today we're releasing a fix for a security vulnerability discovered in Django's internationalization framework. The complete details are below, but the executive summary is that you should updated to a fixed version of Django immediately.
We are releasing point-releases of all affected Django versions. You can download them at http://www.djangoproject.com/download/. Those tracking trunk development should "svn update" as soon as possible.
Please direct any questions about this release to django-users (http://groups.google.com/group/django-users).
DESCRIPTION OF VULNERABILITY
A per-process cache used by Django's internationalization ("i18n") system to store the results of translation lookups for particular values of the HTTP Accept-Language header used the full value of that header as a key. An attacker could take advantage of this by sending repeated requests with extremely large strings in the Accept-Language header, potentially causing a denial of service by filling available memory.
Due to limitations imposed by Web server software on the size of HTTP header fields, combined with reasonable limits on the number of requests which may be handled by a single server process over its lifetime, this vulnerability may be difficult to exploit. Additionally, it is only present when the "USE_I18N" setting in Django is "True" and the i18n middleware component is enabled*. Nonetheless, all users of affected versions of Django are encouraged to update.
AFFECTED VERSIONS
 ...
 Django 0.96
 ...

dev-python/django needs to be bumped from 0.96 to 0.96.1

Reproducible: Always
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2007-10-27 10:00:51 UTC
python and Seemant, please advise.
Comment 2 Seemant Kulleen (RETIRED) gentoo-dev 2007-10-27 12:00:18 UTC
I have an ebuild on the way in (already tested)
Comment 3 Seemant Kulleen (RETIRED) gentoo-dev 2007-10-27 12:11:02 UTC
in cvs, no keywording or other things necessary (it was never stable)