From cb115d85e2d1d3b46ddcc42d2dcf45c1cb0f3e45 Mon Sep 17 00:00:00 2001 From: Sarah Boyce <42296566+sarahboyce@users.noreply.github.com> Date: Wed, 4 Dec 2024 16:30:03 +0100 Subject: [PATCH] [5.0.x] Added CVE-2024-53907 and CVE-2024-53908 to security archive. Backport of 595cb4a7aeb1ba1770d10d601ce9a2b4e487c46e from main. --- docs/releases/security.txt | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) diff --git a/docs/releases/security.txt b/docs/releases/security.txt index c99953a81b..7b2baad2f6 100644 --- a/docs/releases/security.txt +++ b/docs/releases/security.txt @@ -36,6 +36,28 @@ Issues under Django's security process All security issues have been handled under versions of Django's security process. These are listed below. +December 4, 2024 - :cve:`2024-53907` +------------------------------------ + +Potential denial-of-service in django.utils.html.strip_tags(). +`Full description +`__ + +* Django 5.1 :commit:`(patch) ` +* Django 5.0 :commit:`(patch) ` +* Django 4.2 :commit:`(patch) <790eb058b0716c536a2f2e8d1c6d5079d776c22b>` + +December 4, 2024 - :cve:`2024-53908` +------------------------------------ + +Potential SQL injection in HasKey(lhs, rhs) on Oracle. +`Full description +`__ + +* Django 5.1 :commit:`(patch) <6943d61818e63e77b65d8b1ae65941e8f04bd87b>` +* Django 5.0 :commit:`(patch) ` +* Django 4.2 :commit:`(patch) <7376bcbf508883282ffcc0f0fac5cf0ed2d6cbc5>` + September 3, 2024 - :cve:`2024-45231` -------------------------------------