Source: node-xmldom Version: 0.5.0-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for node-xmldom. CVE-2021-32796[0]: | xmldom is an open source pure JavaScript W3C standard-based (XML DOM | Level 2 Core) DOMParser and XMLSerializer module. xmldom versions | 0.6.0 and older do not correctly escape special characters when | serializing elements removed from their ancestor. This may lead to | unexpected syntactic changes during XML processing in some downstream | applications. This issue has been resolved in version 0.7.0. As a | workaround downstream applications can validate the input and reject | the maliciously crafted documents. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-32796 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32796 [1] https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q [2] https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b Please adjust the affected versions in the BTS as needed. Regards, Salvatore -- Pkg-javascript-devel mailing list Pkg-javascript-devel@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-javascript-devel