OESA-2021-1280

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1280
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2021-1280.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2021-1280
Upstream
Published
2021-07-27T11:03:04Z
Modified
2025-08-12T05:05:13.067145Z
Summary
rubygem-kramdown security update
Details

kramdown is yet-another-markdown-parser but fast, pure Ruby, using a strict syntax definition and supporting several common extensions.

Security Fix(es):

The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.(CVE-2020-14001)

Database specific
{
    "severity": "Critical"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / rubygem-kramdown

Package

Name
rubygem-kramdown
Purl
pkg:rpm/openEuler/rubygem-kramdown&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0-3.oe1

Ecosystem specific

{
    "src": [
        "rubygem-kramdown-2.1.0-3.oe1.src.rpm"
    ],
    "noarch": [
        "rubygem-kramdown-help-2.1.0-3.oe1.noarch.rpm",
        "rubygem-kramdown-2.1.0-3.oe1.noarch.rpm"
    ]
}

openEuler:20.03-LTS-SP2 / rubygem-kramdown

Package

Name
rubygem-kramdown
Purl
pkg:rpm/openEuler/rubygem-kramdown&distro=openEuler-20.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0-3.oe1

Ecosystem specific

{
    "src": [
        "rubygem-kramdown-2.1.0-3.oe1.src.rpm"
    ],
    "noarch": [
        "rubygem-kramdown-2.1.0-3.oe1.noarch.rpm",
        "rubygem-kramdown-help-2.1.0-3.oe1.noarch.rpm"
    ]
}