Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Debian Security Advisory 5616-1[6]
- Authored by Debian[7] | Site debian.org[8]
-
Debian Linux Security Advisory 5616-1 - It was discovered that ruby-sanitize, a whitelist-based HTML sanitizer, insufficiently sanitized style elements, which may result in cross-site scripting.
- systems | linux[9], debian[10]
- advisories | CVE-2023-36823[11]
- SHA-256 |
cb1891138c71065ba8a31de094547c27038e14dbb35d632d940934fd3474f59c
- Download[12] | Favorite[13] | View[14]
Change Mirror[15] Download[16]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5616-1Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
https://www.debian.org/security/ Moritz Muehlenhoff
February 05, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : ruby-sanitize
CVE ID : CVE-2023-36823
It was discovered that ruby-sanitize, a whitelist-based HTML sanitizer,
insufficiently sanitised <style> elements, which may result in
cross-site scripting.
For the oldstable distribution (bullseye), this problem has been fixed
in version 5.2.1-2+deb11u1.
For the stable distribution (bookworm), this problem has been fixed in
version 6.0.0-1.1+deb12u1.
We recommend that you upgrade your ruby-sanitize packages.
For the detailed security status of ruby-sanitize please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ruby-sanitize
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list:Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
-----BEGIN PGP SIGNATURE-----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=5owE
-----END PGP SIGNATURE-----
File Tags
- ActiveX[22] (932)
- Advisory[23] (84,059)
- Arbitrary[24] (16,522)
- BBS[25] (2,859)
- Bypass[26] (1,810)
- CGI[27] (1,031)
- Code Execution[28] (7,536)
- Conference[29] (685)
- Cracker[30] (844)
- CSRF[31] (3,366)
- DoS[32] (24,251)
- Encryption[33] (2,380)
- Exploit[34] (52,498)
- File Inclusion[35] (4,242)
- File Upload[36] (982)
- Firewall[37] (822)
- Info Disclosure[38] (2,823)
- Intrusion Detection[39] (903)
- Java[40] (3,112)
- JavaScript[41] (884)
- Kernel[42] (6,905)
- Local[43] (14,633)
- Magazine[44] (586)
- Overflow[45] (12,959)
- Perl[46] (1,430)
- PHP[47] (5,170)
- Proof of Concept[48] (2,360)
- Protocol[49] (3,681)
- Python[50] (1,587)
- Remote[51] (31,212)
- Root[52] (3,612)
- Rootkit[53] (517)
- Ruby[54] (616)
- Scanner[55] (1,646)
- Security Tool[56] (7,953)
- Shell[57] (3,225)
- Shellcode[58] (1,216)
- Sniffer[59] (898)
- Spoof[60] (2,236)
- SQL Injection[61] (16,470)
- TCP[62] (2,420)
- Trojan[63] (688)
- UDP[64] (896)
- Virus[65] (667)
- Vulnerability[66] (32,374)
- Web[67] (9,822)
- Whitepaper[68] (3,763)
- x86[69] (966)
- XSS[70] (18,094)
- Other[71]
File Archives
- February 2024[72]
- January 2024[73]
- December 2023[74]
- November 2023[75]
- October 2023[76]
- September 2023[77]
- August 2023[78]
- July 2023[79]
- June 2023[80]
- May 2023[81]
- April 2023[82]
- March 2023[83]
- Older[84]
Systems
- AIX[85] (429)
- Apple[86] (2,059)
- BSD[87] (375)
- CentOS[88] (57)
- Cisco[89] (1,926)
- Debian[90] (6,960)
- Fedora[91] (1,693)
- FreeBSD[92] (1,246)
- Gentoo[93] (4,440)
- HPUX[94] (880)
- iOS[95] (369)
- iPhone[96] (108)
- IRIX[97] (220)
- Juniper[98] (69)
- Linux[99] (48,477)
- Mac OS X[100] (691)
- Mandriva[101] (3,105)
- NetBSD[102] (256)
- OpenBSD[103] (487)
- RedHat[104] (15,012)
- Slackware[105] (941)
- Solaris[106] (1,611)
- SUSE[107] (1,444)
- Ubuntu[108] (9,264)
- UNIX[109] (9,361)
- UnixWare[110] (187)
- Windows[111] (6,622)
- Other[112]
- Services
- Security Services[123]
- Hosting By
- Rokasec[124]

Read more https://packetstormsecurity.com/files/177000/dsa-5616-1.txt