@@ -36,6 +36,47 @@ Issues under Django's security process
36
36
All security issues have been handled under versions of Django's security
37
37
process. These are listed below.
38
38
39
+ July 9, 2024 - :cve:`2024-39614`
40
+ --------------------------------
41
+
42
+ Potential denial-of-service in
43
+ ``django.utils.translation.get_supported_language_variant()``.
44
+ `Full description
45
+ <https://www.djangoproject.com/weblog/2024/jul/09/security-releases/>`__
46
+
47
+ * Django 5.0 :commit:`(patch) <8e7a44e4bec0f11474699c3111a5e0a45afe7f49>`
48
+ * Django 4.2 :commit:`(patch) <17358fb35fb7217423d4c4877ccb6d1a3a40b1c3>`
49
+
50
+ July 9, 2024 - :cve:`2024-39330`
51
+ --------------------------------
52
+
53
+ Potential directory-traversal in ``django.core.files.storage.Storage.save()``.
54
+ `Full description
55
+ <https://www.djangoproject.com/weblog/2024/jul/09/security-releases/>`__
56
+
57
+ * Django 5.0 :commit:`(patch) <9f4f63e9ebb7bf6cb9547ee4e2526b9b96703270>`
58
+ * Django 4.2 :commit:`(patch) <2b00edc0151a660d1eb86da4059904a0fc4e095e>`
59
+
60
+ July 9, 2024 - :cve:`2024-39329`
61
+ --------------------------------
62
+
63
+ Username enumeration through timing difference for users with unusable
64
+ passwords. `Full description
65
+ <https://www.djangoproject.com/weblog/2024/jul/09/security-releases/>`__
66
+
67
+ * Django 5.0 :commit:`(patch) <07cefdee4a9d1fcd9a3a631cbd07c78defd1923b>`
68
+ * Django 4.2 :commit:`(patch) <156d3186c96e3ec2ca73b8b25dc2ef366e38df14>`
69
+
70
+ July 9, 2024 - :cve:`2024-38875`
71
+ --------------------------------
72
+
73
+ Potential denial-of-service in ``django.utils.html.urlize()``.
74
+ `Full description
75
+ <https://www.djangoproject.com/weblog/2024/jul/09/security-releases/>`__
76
+
77
+ * Django 5.0 :commit:`(patch) <7285644640f085f41d60ab0c8ae4e9153f0485db>`
78
+ * Django 4.2 :commit:`(patch) <79f368764295df109a37192f6182fb6f361d85b5>`
79
+
39
80
March 4, 2024 - :cve:`2024-27351`
40
81
---------------------------------
41
82
0 commit comments