You are here
Home > Preporuke > Ranjivost programskog paketa lxml

Ranjivost programskog paketa lxml

  • Detalji os-a: LDE
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ————————————————————————-
Debian Security Advisory DSA-2941-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
Jun 01, 2014 http://www.debian.org/security/faq
– ————————————————————————-

Package : lxml
CVE ID : CVE-2014-3146

It was discovered that clean_html() function of lxml (pythonic bindings
for the libxml2 and libxslt libraries) performed insufficient
sanitisation for some non-printable characters. This could lead to
cross-site scripting.

For the stable distribution (wheezy), this problem has been fixed in
version 2.3.2-1+deb7u1.

For the testing distribution (jessie), this problem has been fixed in
version 3.3.5-1.

For the unstable distribution (sid), this problem has been fixed in
version 3.3.5-1.

We recommend that you upgrade your lxml packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=nIOs
—–END PGP SIGNATURE—–


To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20140601083618.GA5008@pisco.westfalen.local

AutorTomislav Protega
Cert idNCERT-REF-2014-06-0002-ADV
CveCVE-2014-3146
ID izvornikaDSA-2941-1
Proizvodlxml
Izvorhttp://www.debian.org
Top
More in Preporuke
Ranjivosti programskog paketa chromium-browser

Otkrivene su i otklonjene ranjivosti u web pregledniku, chromium-browser, za Debian OS. Ranjivosti su pronađene u raznim komponentama preglednika, a...

Close