Debian Security Advisory
DLA-3230-1 jqueryui -- LTS security update
- Date Reported:
- 07 Dec 2022
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 1015982.
In Mitre's CVE dictionary: CVE-2021-41182, CVE-2021-41183, CVE-2021-41184, CVE-2022-31160.
- More information:
jQuery-UI, the official jQuery user interface library, is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery were reported to have the following vulnerabilities.
jQuery-UI was accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. This has been fixed and now any string value passed to the `altField` option is now treated as a CSS selector.
jQuery-UI was accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. This has been fixed and now the values passed to various `*Text` options are now always treated as pure text, not HTML.
jQuery-UI was accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. This has been fixed and now any string value passed to the `of` option is now treated as a CSS selector.
jQuery-UI was potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio(
For Debian 10 buster, these problems have been fixed in version 1.12.1+dfsg-5+deb10u1.
We recommend that you upgrade your jqueryui packages.
For the detailed security status of jqueryui please refer to its security tracker page at: https://security-tracker.debian.org/tracker/jqueryui
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS