diff options
| author | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2024-03-04 10:10:35 +0100 |
|---|---|---|
| committer | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2024-03-04 10:13:19 +0100 |
| commit | 3591e1c1acbd7c13174275367c3fdf012cb0413b (patch) | |
| tree | 34523256c955dca705c94faaa7d7091585e155f7 | |
| parent | e64c7e8ac71a16d4045ba635c0f1a3772bb1be24 (diff) | |
[3.2.x] Added CVE-2024-27351 to security archive.stable/3.2.x
Backport of da39ae4b5f056a332b5c48402a2ae11767e7d577 from main
| -rw-r--r-- | docs/releases/security.txt | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/docs/releases/security.txt b/docs/releases/security.txt index 7df74adb82..404af4d00f 100644 --- a/docs/releases/security.txt +++ b/docs/releases/security.txt @@ -36,6 +36,17 @@ Issues under Django's security process All security issues have been handled under versions of Django's security process. These are listed below. +March 4, 2024 - :cve:`2024-27351` +--------------------------------- + +Potential regular expression denial-of-service in +``django.utils.text.Truncator.words()``. `Full description +<https://www.djangoproject.com/weblog/2024/mar/04/security-releases/>`__ + +* Django 5.0 :commit:`(patch) <3394fc6132436eca89e997083bae9985fb7e761e>` +* Django 4.2 :commit:`(patch) <3c9a2771cc80821e041b16eb36c1c37af5349d4a>` +* Django 3.2 :commit:`(patch) <072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521>` + February 6, 2024 - :cve:`2024-24680` ------------------------------------ |
