Debian 9921 Published by

A ruby-sanitize security update has been released for Debian GNU/Linux 10 to address a HTML sanitization bypass vulnerability.



DSA 4730-1: ruby-sanitize security update



- -------------------------------------------------------------------------
Debian Security Advisory DSA-4730-1 security@debian.org
  https://www.debian.org/security/ Salvatore Bonaccorso
July 19, 2020   https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : ruby-sanitize
CVE ID : CVE-2020-4054
Debian Bug : 963808

Michal Bentkowski discovered that ruby-sanitize, a whitelist-based HTML
sanitizer, is prone to a HTML sanitization bypass vulnerability when
using the "relaxed" or a custom config allowing certain elements.
Content in a or element may not be sanitized correctly even
if math and svg are not in the allowlist.

For the stable distribution (buster), this problem has been fixed in
version 4.6.6-2.1~deb10u1.

We recommend that you upgrade your ruby-sanitize packages.

For the detailed security status of ruby-sanitize please refer to its
security tracker page at:
  https://security-tracker.debian.org/tracker/ruby-sanitize

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://www.debian.org/security/