A ruby-sanitize security update has been released for Debian GNU/Linux 10 to address a HTML sanitization bypass vulnerability.
DSA 4730-1: ruby-sanitize security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4730-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 19, 2020 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : ruby-sanitize
CVE ID : CVE-2020-4054
Debian Bug : 963808
Michal Bentkowski discovered that ruby-sanitize, a whitelist-based HTML
sanitizer, is prone to a HTML sanitization bypass vulnerability when
using the "relaxed" or a custom config allowing certain elements.
Content in a or element may not be sanitized correctly even
if math and svg are not in the allowlist.
For the stable distribution (buster), this problem has been fixed in
version 4.6.6-2.1~deb10u1.
We recommend that you upgrade your ruby-sanitize packages.
For the detailed security status of ruby-sanitize please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/ruby-sanitize
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/