Processing control commands:
> tags -1 + confirmed
Bug #1006215 [release.debian.org] bullseye-pu: package
node-prismjs/1.23.0+dfsg-1+deb11u1
Added tag(s) confirmed.
--
1006215: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006215
Debian Bug Tracking System
Contact ow...@bugs.debian.org wit
Control: tags -1 + confirmed
On Thu, 2022-02-24 at 06:41 +0100, Yadd wrote:
+node-prismjs (1.23.0+dfsg-1+deb11u2) bullseye; urgency=medium
+
+ * Command Line: Escape markup in command line output
+(Closes: CVE-2022-23647)
+ * Fix also minified files (Really closes: CVE-2021-3801)
Please go
On 23/02/2022 22:44, Salvatore Bonaccorso wrote:
hi,
On Wed, Feb 23, 2022 at 10:27:33PM +0100, Moritz Mühlenhoff wrote:
Am Mon, Feb 21, 2022 at 01:57:54PM +0100 schrieb Yadd:
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
hi,
On Wed, Feb 23, 2022 at 10:27:33PM +0100, Moritz Mühlenhoff wrote:
> Am Mon, Feb 21, 2022 at 01:57:54PM +0100 schrieb Yadd:
> > Package: release.debian.org
> > Severity: normal
> > Tags: bullseye
> > User: release.debian@packages.debian.org
> > Usertags: pu
> >
> > [ Reason ]
> > node-pri
Am Mon, Feb 21, 2022 at 01:57:54PM +0100 schrieb Yadd:
> Package: release.debian.org
> Severity: normal
> Tags: bullseye
> User: release.debian@packages.debian.org
> Usertags: pu
>
> [ Reason ]
> node-prismjs has 2 vulnerabilities:
> * Regex DoS (CVE-2021-40438)
Where did you get that CVE re
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
[ Reason ]
node-prismjs has 2 vulnerabilities:
* Regex DoS (CVE-2021-40438)
* cross-site scripting attack (CVE-2022-23647)
[ Impact ]
Medium vulnerabilities
[ Tests ]
No change
6 matches
Mail list logo