Login
Newsletter
Werbung

Sicherheit: Cross-Site Scripting in python-markdown2
Aktuelle Meldungen Distributionen
Name: Cross-Site Scripting in python-markdown2
ID: FEDORA-2018-6a8028084d
Distribution: Fedora
Plattformen: Fedora 29
Datum: Di, 9. Oktober 2018, 10:20
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5773
Applikationen: python-markdown2

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2018-6a8028084d
2018-10-09 00:04:24.598173
-------------------------------------------------------------------------------
-

Name : python-markdown2
Product : Fedora 29
Version : 2.3.6
Release : 1.fc29
URL : https://github.com/trentm/python-markdown2/
Summary : A fast and complete Python implementation of Markdown
Description :
Markdown is a text-to-HTML filter; it translates an easy-to-read /
easy-to-write structured text format into HTML. Markdown's text format
is most similar to that of plain text email, and supports features
such as headers, emphasis, code blocks, blockquotes, and links.

This is a fast and complete Python implementation of the Markdown
spec.

For information about markdown itself, see
http://daringfireball.net/projects/markdown/

-------------------------------------------------------------------------------
-
Update Information:

#### python-markdown2 2.3.6 #### - [pull #282] Add TOC depth option - [pull
#283] Fix to add TOC html to output via CLI - [pull #284] Do not remove anchors
in safe_mode - [pull #288] fixing cuddled-lists with a single list item - [pull
#292] Fix Wrong rendering of last list element - [pull #295] link-patterns fix
-
[pull #300] Replace a deprecated method - [pull #301] DeprecationWarning:
invalid escape sequence - [pull #302] Fix "make test" in Python 3 -
[pull #303]
Fix CVE-2018-5773
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1536923 - CVE-2018-5773 python-markdown2: Unsanitized input in
markdown() method allows for cross-site scripting (XSS) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1536923
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-6a8028084d' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung