- -------------------------------------------------------------------------
Debian Security Advisory DSA-4880-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
March 29, 2021                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : lxml
CVE ID         : CVE-2021-28957
Debian Bug     : 985643

Kevin Chung discovered that lxml, a Python binding for the libxml2 and
libxslt libraries, did not properly sanitize its input. This would
allow a malicious user to mount a cross-site scripting attack.

For the stable distribution (buster), this problem has been fixed in
version 4.3.2-1+deb10u3.

We recommend that you upgrade your lxml packages.

For the detailed security status of lxml please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/lxml

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-4880-1: lxml security update

March 29, 2021
Kevin Chung discovered that lxml, a Python binding for the libxml2 and libxslt libraries, did not properly sanitize its input

Summary

For the stable distribution (buster), this problem has been fixed in
version 4.3.2-1+deb10u3.

We recommend that you upgrade your lxml packages.

For the detailed security status of lxml please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/lxml

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Kevin Chung discovered that lxml, a Python binding for the libxml2 and
libxslt libraries, did not properly sanitize its input. This would
allow a malicious user to mount a cross-site scripting attack.

Related News