Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Debian Security Advisory 5339-1[6]
- Authored by Debian[7] | Site debian.org[8]
-
Debian Linux Security Advisory 5339-1 - Ikeda Soji reported that libhtml-stripscripts-perl, a Perl module for removing scripts from HTML, is prone to a regular expression denial of service, due to catastrophic backtracking for HTML content with specially crafted style attributes.
- systems | linux[9], debian[10]
- advisories | CVE-2023-24038[11]
- SHA-256 |
bf8cb8b66ff079009ce37d09bcafe99b7218495bbb1c7dae58b492f0c5bb6b15
- Download[12] | Favorite[13] | View[14]
Change Mirror[15] Download[16]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5339-1Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
https://www.debian.org/security/ Salvatore Bonaccorso
February 05, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libhtml-stripscripts-perl
CVE ID : CVE-2023-24038
Debian Bug : 1029400
Ikeda Soji reported that libhtml-stripscripts-perl, a Perl module for
removing scripts from HTML, is prone to a regular expression denial of
service, due to catastrophic backtracking for HTML content with
specially crafted style attributes.
For the stable distribution (bullseye), this problem has been fixed in
version 1.06-1+deb11u1.
We recommend that you upgrade your libhtml-stripscripts-perl packages.
For the detailed security status of libhtml-stripscripts-perl please
refer to its security tracker page at:
https://security-tracker.debian.org/tracker/libhtml-stripscripts-perl
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list:Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
-----BEGIN PGP SIGNATURE-----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=vLWj
-----END PGP SIGNATURE-----
File Tags
- ActiveX[21] (932)
- Advisory[22] (80,106)
- Arbitrary[23] (15,775)
- BBS[24] (2,859)
- Bypass[25] (1,644)
- CGI[26] (1,020)
- Code Execution[27] (6,974)
- Conference[28] (675)
- Cracker[29] (840)
- CSRF[30] (3,295)
- DoS[31] (22,737)
- Encryption[32] (2,355)
- Exploit[33] (50,529)
- File Inclusion[34] (4,173)
- File Upload[35] (948)
- Firewall[36] (821)
- Info Disclosure[37] (2,677)
- Intrusion Detection[38] (871)
- Java[39] (2,950)
- JavaScript[40] (826)
- Kernel[41] (6,357)
- Local[42] (14,233)
- Magazine[43] (586)
- Overflow[44] (12,464)
- Perl[45] (1,419)
- PHP[46] (5,099)
- Proof of Concept[47] (2,293)
- Protocol[48] (3,444)
- Python[49] (1,470)
- Remote[50] (30,141)
- Root[51] (3,522)
- Rootkit[52] (501)
- Ruby[53] (598)
- Scanner[54] (1,633)
- Security Tool[55] (7,805)
- Shell[56] (3,115)
- Shellcode[57] (1,206)
- Sniffer[58] (889)
- Spoof[59] (2,177)
- SQL Injection[60] (16,140)
- TCP[61] (2,383)
- Trojan[62] (686)
- UDP[63] (879)
- Virus[64] (662)
- Vulnerability[65] (31,240)
- Web[66] (9,408)
- Whitepaper[67] (3,736)
- x86[68] (946)
- XSS[69] (17,533)
- Other[70]
File Archives
- February 2023[71]
- January 2023[72]
- December 2022[73]
- November 2022[74]
- October 2022[75]
- September 2022[76]
- August 2022[77]
- July 2022[78]
- June 2022[79]
- May 2022[80]
- April 2022[81]
- March 2022[82]
- Older[83]
Systems
- AIX[84] (426)
- Apple[85] (1,945)
- BSD[86] (370)
- CentOS[87] (55)
- Cisco[88] (1,917)
- Debian[89] (6,673)
- Fedora[90] (1,690)
- FreeBSD[91] (1,242)
- Gentoo[92] (4,288)
- HPUX[93] (878)
- iOS[94] (337)
- iPhone[95] (108)
- IRIX[96] (220)
- Juniper[97] (67)
- Linux[98] (44,655)
- Mac OS X[99] (684)
- Mandriva[100] (3,105)
- NetBSD[101] (255)
- OpenBSD[102] (480)
- RedHat[103] (12,657)
- Slackware[104] (941)
- Solaris[105] (1,609)
- SUSE[106] (1,444)
- Ubuntu[107] (8,287)
- UNIX[108] (9,188)
- UnixWare[109] (185)
- Windows[110] (6,520)
- Other[111]
Read more https://packetstormsecurity.com/files/170858/dsa-5339-1.txt