First published: Mon Oct 26 2020(Updated: )
It was discovered that kramdown insecurely handled certain crafted input. An attacker could use this vulnerability to read restricted files or execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/kramdown | <1.17.0-4ubuntu0.20.10.1 | 1.17.0-4ubuntu0.20.10.1 |
=20.10 | ||
All of | ||
ubuntu/ruby-kramdown | <1.17.0-4ubuntu0.20.10.1 | 1.17.0-4ubuntu0.20.10.1 |
=20.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this kramdown vulnerability is USN-4562-2.
The severity of the kramdown vulnerability is not mentioned in the information provided.
The kramdown vulnerability affects the kramdown package and the ruby-kramdown package on Ubuntu 20.10.
An attacker could exploit this kramdown vulnerability to read restricted files or execute arbitrary code.
To fix the kramdown vulnerability, update the kramdown package and the ruby-kramdown package to version 1.17.0-4ubuntu0.20.10.1 or later.