drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Scripting in ruby-redcarpet
Name: |
Cross-Site Scripting in ruby-redcarpet |
|
ID: |
DSA-4831-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian buster |
|
Datum: |
Fr, 15. Januar 2021, 19:52 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26298 |
|
Applikationen: |
ruby-redcarpet |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4831-1 security@debian.org https://www.debian.org/security/ Sebastien Delafond January 15, 2021 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : ruby-redcarpet CVE ID : CVE-2020-26298 Debian Bug : 980057
Johan Smits discovered that ruby-redcarpet, a markdown parser, did not properly validate its input. This would allow an attacker to mount a cross-site scripting attack.
For the stable distribution (buster), this problem has been fixed in version 3.4.0-4+deb10u1.
We recommend that you upgrade your ruby-redcarpet packages.
For the detailed security status of ruby-redcarpet please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby-redcarpet
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmABkzwACgkQEL6Jg/PV nWSUJAf/S5a13rCfo6KGpWr3h1YAyuUlH8pFdM3zytlvX7tLDZMIQon1OL0fKecP lPDVE90EJoLBUUxdF1rSYWSQDS4fbCvSVuzcUqGrwgWvmEjL3rUTqaK189KB32sE 1wmGfqz0MS0ZBSAkPWLqkuMgRhP4SL2H78W9nssdLlC/eZ9G0kM1gTVOzQlrRVrc BNKX73zMfwP2LREWXpjMCpu6IxfNHaIWQHjWbDwWb92qbz0LAnujExo0PoKWGsvR 5DSYS+rasHfUr8VWGopKMZQp4AfFBKH+oAG2qpPpwGwRda9bI88yfT6hXtctpfDz kn5ERoIrC6OgXOEO9LnbLAUsEtCSSg== =D3qU -----END PGP SIGNATURE-----
|
|
|
|