|
|
Subscribe / Log in / New account

Ubuntu alert USN-4562-1 (ruby-kramdown)

From:  Mike Salvatore <mike.salvatore@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-4562-1] kramdown vulnerability
Date:  Wed, 30 Sep 2020 18:02:04 -0400
Message-ID:  <b7f57afa-ce77-7436-570e-8e47a72fea0f@canonical.com>

========================================================================== Ubuntu Security Notice USN-4562-1 September 30, 2020 ruby-kramdown vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: kramdown could be made to crash, run programs, or leak sensitive information if it opened a specially crafted file. Software Description: - ruby-kramdown: Fast, pure-Ruby Markdown-superset converter - ruby library Details: It was discovered that kramdown insecurely handled certain crafted input. An attacker could use this vulnerability to read restricted files or execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: kramdown 1.17.0-4ubuntu0.1 ruby-kramdown 1.17.0-4ubuntu0.1 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4562-1 CVE-2020-14001 Package Information: https://launchpad.net/ubuntu/+source/ruby-kramdown/1.17.0... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds