[DRE-maint] Bug#961847: ruby-kaminari: CVE-2020-11082

Salvatore Bonaccorso carnil at debian.org
Sat May 30 10:36:02 BST 2020


Source: ruby-kaminari
Version: 1.0.1-5
Severity: important
Tags: security upstream
Control: found -1 1.0.1-4

Hi,

The following vulnerability was published for ruby-kaminari.

CVE-2020-11082[0]:
| In Kaminari before 1.2.1, there is a vulnerability that would allow an
| attacker to inject arbitrary code into pages with pagination links.
| This has been fixed in 1.2.1.

Note that PARAM_KEY_BLACKLIST was renamed to PARAM_KEY_EXCEPT_LIST in
v1.2.0 upstream to improve the wording (cf. upstream commit
1783c9cf13b24b580497896caa95c6faac10ac50).

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-11082
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11082
[1] https://github.com/kaminari/kaminari/commit/8dd52a1aed3d2fa2835d836de23fc0d8c4ff5db8
[2] https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the Pkg-ruby-extras-maintainers mailing list