CVE-2020-14001: The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum. Patch, included in 2.3.0: https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde Maintainer(s), please cleanup vulnerable versions.
Cleanup mostly done, but app-text/webgen depends on kramdown-1.x. I have filed a bug for this package: https://github.com/gettalong/webgen/issues/17
Looks like we can cleanup now?
dev-ruby/kramdown:0 has now been masked for removal.
(In reply to Hans de Graaff from comment #3) > dev-ruby/kramdown:0 has now been masked for removal. Thanks!
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=3915b68bbc814b693c39d43ea67b7a670943f71b commit 3915b68bbc814b693c39d43ea67b7a670943f71b Author: Michał Górny <mgorny@gentoo.org> AuthorDate: 2020-09-14 17:18:23 +0000 Commit: Michał Górny <mgorny@gentoo.org> CommitDate: 2020-09-14 17:23:44 +0000 dev-ruby/kramdown: Remove masked slot :0 Bug: https://bugs.gentoo.org/733116 Signed-off-by: Michał Górny <mgorny@gentoo.org> dev-ruby/kramdown/Manifest | 1 - dev-ruby/kramdown/kramdown-1.17.0-r2.ebuild | 51 ----------------------------- profiles/package.mask | 5 --- 3 files changed, 57 deletions(-)
Tree is clean. All done.