Debian Security Advisory
DLA-2368-1 grunt -- LTS security update
- Date Reported:
- 09 Sep 2020
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2020-7729.
- More information:
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
For Debian 9
Stretch, these problems have been fixed in version 1.0.1-5+deb9u1.
We recommend that you upgrade your grunt packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS