diff --git a/ChangeLog-8.php b/ChangeLog-8.php
index 9831ecc009..8bc457aa16 100644
--- a/ChangeLog-8.php
+++ b/ChangeLog-8.php
@@ -13,8 +13,8 @@
- CGI:
- - Fixed bug GHSA-p99j-rfp4-xqvq (Bypass of CVE-2024-4577, Parameter Injection Vulnerability). (CVE-2024-8926)
- - Fixed bug GHSA-94p6-54jq-9mwp (cgi.force_redirect configuration is bypassable due to the environment variable collision). (CVE-2024-8927)
+ - Fixed bug (Bypass of CVE-2024-4577, Parameter Injection Vulnerability). (CVE-2024-8926)
+ - Fixed bug (cgi.force_redirect configuration is bypassable due to the environment variable collision). (CVE-2024-8927)
- Core:
- FPM:
- - Fixed bug GHSA-865w-9rf3-2wh5 (Logs from childrens may be altered). (CVE-2024-9026)
+ - Fixed bug (Logs from childrens may be altered). (CVE-2024-9026)
- MySQLnd:
- SAPI:
- - Fixed bug GHSA-9pqp-7h25-4f32 (Erroneous parsing of multipart form data). (CVE-2024-8925)
+ - Fixed bug (Erroneous parsing of multipart form data). (CVE-2024-8925)
- Standard:
diff --git a/bin/news2html b/bin/news2html
index 8fbf9cf42b..661b9e0ecd 100755
--- a/bin/news2html
+++ b/bin/news2html
@@ -66,6 +66,8 @@ $bug_map = [
'/Implemented FR #([0-9]+)/' => '',
'/GitHub PR #([0-9]+)/' => '',
'/GH-([0-9]+)/' => '',
+ '/GHSA-([0-9a-z]{4}-[0-9a-z]{4}-[0-9a-z]{4})/'
+ => '',
];
foreach($entries as $module => $items) {
diff --git a/include/changelogs.inc b/include/changelogs.inc
index 1a63631438..9dc45369bd 100644
--- a/include/changelogs.inc
+++ b/include/changelogs.inc
@@ -28,6 +28,10 @@ function githubissuel($repo, $number): void {
echo "GH-$number";
}
+function githubsecurityl($repo, $id): void {
+ echo "GHSA-$id";
+}
+
function release_date($in): void {
$time = strtotime($in);
$human_readable = date('d M Y', $time);