From cb115d85e2d1d3b46ddcc42d2dcf45c1cb0f3e45 Mon Sep 17 00:00:00 2001
From: Sarah Boyce <42296566+sarahboyce@users.noreply.github.com>
Date: Wed, 4 Dec 2024 16:30:03 +0100
Subject: [PATCH] [5.0.x] Added CVE-2024-53907 and CVE-2024-53908 to security
archive.
Backport of 595cb4a7aeb1ba1770d10d601ce9a2b4e487c46e from main.
---
docs/releases/security.txt | 22 ++++++++++++++++++++++
1 file changed, 22 insertions(+)
diff --git a/docs/releases/security.txt b/docs/releases/security.txt
index c99953a81b..7b2baad2f6 100644
--- a/docs/releases/security.txt
+++ b/docs/releases/security.txt
@@ -36,6 +36,28 @@ Issues under Django's security process
All security issues have been handled under versions of Django's security
process. These are listed below.
+December 4, 2024 - :cve:`2024-53907`
+------------------------------------
+
+Potential denial-of-service in django.utils.html.strip_tags().
+`Full description
+`__
+
+* Django 5.1 :commit:`(patch) `
+* Django 5.0 :commit:`(patch) `
+* Django 4.2 :commit:`(patch) <790eb058b0716c536a2f2e8d1c6d5079d776c22b>`
+
+December 4, 2024 - :cve:`2024-53908`
+------------------------------------
+
+Potential SQL injection in HasKey(lhs, rhs) on Oracle.
+`Full description
+`__
+
+* Django 5.1 :commit:`(patch) <6943d61818e63e77b65d8b1ae65941e8f04bd87b>`
+* Django 5.0 :commit:`(patch) `
+* Django 4.2 :commit:`(patch) <7376bcbf508883282ffcc0f0fac5cf0ed2d6cbc5>`
+
September 3, 2024 - :cve:`2024-45231`
-------------------------------------