ruby-rails-html-sanitizer (1.0.4-1+deb10u2) buster-security; urgency=high
* Non-maintainer upload by the LTS Security Team. (Closes: #1027153)
* CVE-2022-23517: Certain configurations use an inefficient regular
expression that is susceptible to excessive backtracking when
attempting to sanitize certain SVG attributes. This may lead to a
denial of service through CPU resource consumption.
Fix requires ruby-loofah >= 2.2.3-1+deb10u2.
* CVE-2022-23518: cross-site scripting via data URIs when used in
combination with Loofah.
Fix requires ruby-loofah >= 2.2.3-1+deb10u2.
* CVE-2022-23519: XSS vulnerability with certain configurations of
Rails::Html::Sanitizer may allow an attacker to inject content if the
application developer has overridden the sanitizer's allowed tags in
either of the following ways: allow both "math" and "style" elements,
or allow both "svg" and "style" elements.
Same fix as CVE-2022-23520.
* CVE-2022-23520: XSS vulnerability with certain configurations of
Rails::Html::Sanitizer due to an incomplete fix of
CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject
content if the application developer has overridden the sanitizer's
allowed tags to allow both "select" and "style" elements. Code is only
impacted if allowed tags are being overridden.
Fix requires ruby-loofah >= 2.2.3-1+deb10u2.
* Drop patch for CVE 2022-32209, replaced by the one for
CVE-2022-23519/23520.
-- Sylvain Beucler Wed, 13 Sep 2023 11:43:01 +0200
ruby-rails-html-sanitizer (1.0.4-1+deb10u1) buster-security; urgency=high
* Non-maintainer upload by the LTS team.
* Add patch to prevent a possible XSS vulnerability in certain
configurations. (Closes: #1013806) (Fixes: CVE-2022-32209)
-- Utkarsh Gupta Tue, 06 Dec 2022 19:42:35 +0530
ruby-rails-html-sanitizer (1.0.4-1) unstable; urgency=medium
* New upstream release.
* debian/compat: Bump debhelper compatibility level to 11.
* debian/control:
- Bump required debhelper version to >= 11~.
- Bump Standards-Version to 4.1.3 (no changes needed).
- Use salsa.debian.org in Vcs-* fields.
- Add myself as Uploader.
- Require ruby-loofah >= 2.2.2~.
* debian/copyright:
- Use HTTPS in link to copyright format specification.
- Add missing Debian packaging authors.
* debian/patches: Drop patch to skip failing specs, fixed upstream.
* debian/watch: Use version 4 and HTTPS in link to gemwatch service.
-- Georg Faerber Fri, 23 Mar 2018 13:42:07 +0100
ruby-rails-html-sanitizer (1.0.3-2) unstable; urgency=medium
* Team upload.
[ Cédric Boutillier ]
* Bump debhelper compatibility level to 9
* Use https:// in Vcs-* fields
* Bump Standards-Version to 3.9.7 (no changes needed)
[ Christian Hofstaedtler ]
* Drop ruby-rails from Depends, as no lib code actually loads rails;
makes the dependency cycle a little less bad.
-- Christian Hofstaedtler Sat, 05 Mar 2016 04:24:42 +0100
ruby-rails-html-sanitizer (1.0.3-1) unstable; urgency=high
* New upstream release. Contains fixes for several XSS vulnerabilities:
CVE-2015-7578 CVE-2015-7579 CVE-2015-7580 (Closes: #812814)
* debian/ruby-tests.rake: re-enable test that was disabled
* 0001-Skip-some-tests-under-Debian.patch: skip tests where the sanitized
HTML is XSS-free but does not match the exact content expected by the
upstream test suite. I suspect that is due to Nokogiri not using its own
patched version of libxml2 in Debian, but can't be sure of that yet.
Also, the same tests would already fail on 1.0.2 if enabled.
-- Antonio Terceiro Tue, 26 Jan 2016 19:36:51 -0200
ruby-rails-html-sanitizer (1.0.2-1) unstable; urgency=medium
* Initial release (Closes: #784326)
* Disabled a test as it required gems which have Rails > 4.2.0 in its
dependency chain
-- Balasankar C Tue, 05 May 2015 13:07:22 +0530