Friday, September 25, 2020

[USN-4543-1] Sanitize vulnerability

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEElnO/d49FoUPK9fwytGdj0GOh2+wFAl9uK5EACgkQtGdj0GOh
2+zkvgf/XOQhlqbVp9O4P/kht150A/AHTqMKeW/3EKl2+1cWtb8g59I3ABrKTLhU
emtF/qT1RRL+3LAFLRMUZwliZg5psayVv/xNlz1GSs/XoaQUh1pZ5/9ZqROc/q6q
mi1jjIrEtJjOhajWrcYahj4URJuMRWanY2y6lZJx61s8xxtQ6ks5DjrwkVuGMly7
RlVgMwSjH+aJEtG896kduFXb8E8uk+d8DV8WbcAdccMXKTkViCSoKsYTo4ECFVNl
u+snjieLSoa1PAs8MhWmBINuTsAKBEzU9qSDySw3G/oSnu2jKpsQOH8O5kP6EmPv
cE6UbqAsBfmpP7RKmEHSLdSYSrRsqA==
=oA7D
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-4543-1
September 25, 2020

ruby-sanitize vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Sanitize could be made to perform XSS attacks if it received specially
crafted input.

Software Description:
- ruby-sanitize: allowlist-based HTML and CSS sanitizer

Details:

Michał Bentkowski discovered that Sanitize did not properly sanitize some
math or svg HTML under certain circumstances. A remote attacker could
potentially exploit this to conduct cross-site scripting (XSS) attacks.
(CVE-2020-4054)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
ruby-sanitize 4.6.6-2.1~0.20.04.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4543-1
CVE-2020-4054

Package Information:
https://launchpad.net/ubuntu/+source/ruby-sanitize/4.6.6-2.1~0.20.04.1

No comments:

Post a Comment