Hey, I've fixed CVE-2017-1002201 and thus request for someone to sponsor the upload of ruby-haml. The package is tested and uploaded to mentors.d.net and the relevant .dsc could be found here[1]. I'm also attaching the DLA file for the same. Best, Utkarsh --- [1]: https://mentors.debian.net/debian/pool/main/r/ruby-haml/ruby-haml_4.0.5-2+deb8u1.dsc
From: Utkarsh Gupta <guptautkarsh2102@gmail.com> To: debian-lts-announce@lists.debian.org Subject: [SECURITY] [DLA 1986-1] ruby-haml security update Package : ruby-haml Version : 4.0.5-2+deb8u1 CVE ID : CVE-2017-1002201 In haml, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code. For Debian 8 "Jessie", this problem has been fixed in version 4.0.5-2+deb8u1. We recommend that you upgrade your ruby-haml packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: OpenPGP digital signature