Fedora Linux 8783 Published by

A perl-HTML-StripScripts security update has been released for Fedora 38.



[SECURITY] Fedora 38 Update: perl-HTML-StripScripts-1.06-22.fc38


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-a42aa9700f
2023-06-16 02:20:54.533181
--------------------------------------------------------------------------------

Name : perl-HTML-StripScripts
Product : Fedora 38
Version : 1.06
Release : 22.fc38
URL : https://metacpan.org/release/HTML-StripScripts
Summary : Strip scripting constructs out of HTML
Description :
This module strips scripting constructs out of HTML, leaving as much non-
scripting markup in place as possible. This allows web applications to
display HTML originating from an untrusted source without introducing XSS
(cross site scripting) vulnerabilities.

--------------------------------------------------------------------------------
Update Information:

Fixes CVE-2023-24038
--------------------------------------------------------------------------------
ChangeLog:

* Wed Jun 7 2023 Xavier Bachelot [xavier@bachelot.org] 1.06-22
- Add patch for CVE-2023-24038
- Convert License: to SPDX
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2164148 - CVE-2023-24038 perl-HTML-StripScripts: Handler for style attribute is vulnerable to ReDoS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2164148
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-a42aa9700f' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------