Debian Patches

Status for ruby-sanitize/6.0.0-1.1+deb12u1

Patch Description Author Forwarded Bugs Origin Last update
no-relative-path.patch autopkgtest should not use relative paths no
Update-tests-to-remove-deprecated-minitest-must_be.patch Update tests to remove deprecated minitest 'must_be' Roman Vakulchik <rvakulchik@gmail.com> no https://github.com/rgrove/sanitize/commit/a37a51b583fa4a97486d47e32625dae1baf0574c 2021-08-20
Forcibly-escape-content-in-unescaped-text-elements-i.patch Forcibly escape content in "unescaped text" elements inside math or svg namespaces

This fixes an edge case in which the contents of an "unescaped text"
element (such as `<noembed>` or `<xmp>`) were not properly escaped if
that element was allowlisted and was also inside an allowlisted `<math>`
or `<svg>` element.

The only way to encounter this situation was to ignore multiple warnings
in the readme and create a custom config that allowlisted all the
elements involved, including `<math>` or `<svg>`.

Please let this be a reminder that Sanitize cannot safely sanitize
MathML or SVG content and does not support this use case. The default
configs don't allow MathML or SVG elements, and allowlisting MathML or
SVG elements in a custom config may create a security vulnerability in
your application.

Documentation has been updated to add more warnings and to make the
existing warnings about this more prominent.
Ryan Grove <ryan@wonko.com> no https://github.com/rgrove/sanitize/commit/b4ee521df0d0616340c9648444be488381c238b1 2023-01-25
Always-remove-noscript-elements.patch Always remove `<noscript>` elements
...even if `noscript` is in the allowlist.

A `<noscript>` element's content is parsed differently in browsers
depending on whether or not scripting is enabled. Since Nokogiri doesn't
support scripting, it always parses `<noscript>` elements as if
scripting is disabled. This results in edge cases where it's not
possible to reliably sanitize the contents of a `<noscript>` element
because Nokogiri can't fully replicate the parsing behavior of a
scripting-enabled browser. The safest thing to do is to simply remove
all `<noscript>` elements.

Fixes GHSA-fw3g-2h3j-qmm7
Ryan Grove <ryan@wonko.com> no debian https://github.com/rgrove/sanitize/commit/ec14265e530dc3fe31ce2ef773594d3a97778d22 2023-01-26
CVE-2023-36823.patch [PATCH 1/3] Escape `</` to prevent a style element from being closed prematurely Ryan Grove <ryan@wonko.com> no 2023-06-26

All known versions for source package 'ruby-sanitize'

Links