openSUSE Security Update: Security update for python-bleach

Announcement ID:    openSUSE-SU-2021:0571-1
Rating:             important
References:         #1167379 #1168280 #1184547 
Cross-References:   CVE-2020-6816 CVE-2020-6817 CVE-2021-23980
CVSS scores:
                    CVE-2020-6816 (NVD) : 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
                    CVE-2021-23980 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Affected Products:
                    openSUSE Backports SLE-15-SP2

   An update that fixes three vulnerabilities is now available.


   This update for python-bleach fixes the following issues:

   - CVE-2021-23980: Fixed mutation XSS on bleach.clean with specific
     combinations of allowed tags (boo#1184547)

   Update to 3.1.5:

   * replace missing ``setuptools`` dependency with ``packaging``. Thank you
     Benjamin Peterson.

   Update to 3.1.4 (boo#1168280, CVE-2020-6817):

   * ``bleach.clean`` behavior parsing style attributes could result in a
     regular expression denial of service (ReDoS). Calls to ``bleach.clean``
     with an allowed tag with an allowed ``style`` attribute were vulnerable
     to ReDoS. For example, ``bleach.clean(..., attributes={'a':
   * Style attributes with dashes, or single or double quoted values are
     cleaned instead of passed through.

   update to 3.1.3 (boo#1167379, CVE-2020-6816):

   * Add relative link to code of conduct. (#442)
   * Drop deprecated ' test' support. (#507)
   * Fix typo: curren -> current in tests/ (#504)
   * Test on PyPy 7
   * Drop test support for end of life Python 3.4
   * ``bleach.clean`` behavior parsing embedded MathML and SVG content with
     RCDATA tags did not match browser behavior and could result in a
     mutation XSS. Calls to ``bleach.clean`` with ``strip=False`` and
     ``math`` or ``svg`` tags and one or more of the RCDATA tags ``script``,
     ``noscript``, ``style``, ``noframes``, ``iframe``, ``noembed``, or
     ``xmp`` in the allowed tags whitelist were vulnerable to a mutation XSS.

   This update was imported from the openSUSE:Leap:15.2:Update update project.

Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP2:

      zypper in -t patch openSUSE-2021-571=1

Package List:

   - openSUSE Backports SLE-15-SP2 (noarch):