summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMariusz Felisiak <felisiak.mariusz@gmail.com>2024-03-04 10:10:35 +0100
committerMariusz Felisiak <felisiak.mariusz@gmail.com>2024-03-04 10:13:19 +0100
commit3591e1c1acbd7c13174275367c3fdf012cb0413b (patch)
tree34523256c955dca705c94faaa7d7091585e155f7
parente64c7e8ac71a16d4045ba635c0f1a3772bb1be24 (diff)
[3.2.x] Added CVE-2024-27351 to security archive.stable/3.2.x
Backport of da39ae4b5f056a332b5c48402a2ae11767e7d577 from main
-rw-r--r--docs/releases/security.txt11
1 files changed, 11 insertions, 0 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt
index 7df74adb82..404af4d00f 100644
--- a/docs/releases/security.txt
+++ b/docs/releases/security.txt
@@ -36,6 +36,17 @@ Issues under Django's security process
All security issues have been handled under versions of Django's security
process. These are listed below.
+March 4, 2024 - :cve:`2024-27351`
+---------------------------------
+
+Potential regular expression denial-of-service in
+``django.utils.text.Truncator.words()``. `Full description
+<https://www.djangoproject.com/weblog/2024/mar/04/security-releases/>`__
+
+* Django 5.0 :commit:`(patch) <3394fc6132436eca89e997083bae9985fb7e761e>`
+* Django 4.2 :commit:`(patch) <3c9a2771cc80821e041b16eb36c1c37af5349d4a>`
+* Django 3.2 :commit:`(patch) <072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521>`
+
February 6, 2024 - :cve:`2024-24680`
------------------------------------