In Sanitize (RubyGem sanitize) greater than or equal to 3.0.0 and less than
5.2.1, there is a cross-site scripting vulnerability. When HTML is
sanitized using Sanitize's "relaxed" config, or a custom config that allows
certain elements, some content in a math or svg element may not be
sanitized correctly even if math and svg are not in the allowlist. You are
likely to be vulnerable to this issue if you use Sanitize's relaxed config
or a custom config that allows one or more of the following HTML elements:
iframe, math, noembed, noframes, noscript, plaintext, script, style, svg,
xmp. Using carefully crafted input, an attacker may be able to sneak
arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site
scripting) or other undesired behavior when that HTML is rendered in a
browser. This has been fixed in 5.2.1.
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 20.04 LTS (Focal Fossa):released (4.6.6-2.1~
Ubuntu 20.10 (Groovy Gorilla):not-affected (4.6.6-2.1)
More Information

Updated: 2020-09-26 02:19:21 UTC (commit dabd3af71e401b9fb6a4a072047eea5835e510be)