An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. The strip_tags() method and striptags template filter are subject to a potential denial-of-service attack via certain inputs containing large sequences of nested incomplete HTML entities.
{
    "binaries": [
        {
            "binary_name": "python-django",
            "binary_version": "1.8.7-1ubuntu5.15+esm8"
        },
        {
            "binary_name": "python-django-common",
            "binary_version": "1.8.7-1ubuntu5.15+esm8"
        },
        {
            "binary_name": "python3-django",
            "binary_version": "1.8.7-1ubuntu5.15+esm8"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
    "binaries": [
        {
            "binary_name": "python-django",
            "binary_version": "1:1.11.11-1ubuntu1.21+esm8"
        },
        {
            "binary_name": "python-django-common",
            "binary_version": "1:1.11.11-1ubuntu1.21+esm8"
        },
        {
            "binary_name": "python3-django",
            "binary_version": "1:1.11.11-1ubuntu1.21+esm8"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}