File _patchinfo of Package patchinfo.7726

<patchinfo incident="7726">
  <issue id="1072307" tracker="bnc">VUL-0: CVE-2017-16876: python-mistune: Cross-site-scripting</issue>
  <issue id="1064640" tracker="bnc">VUL-0: CVE-2017-15612: python-mistune: XSS via an unexpected newline / crafted email address</issue>
  <issue id="2017-15612" tracker="cve" />
  <issue id="2017-16876" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>scarabeus_iv</packager>
  <description>This update for python-mistune to version 0.8.3 fixes several issues.

These security issues were fixed:

- CVE-2017-16876: Cross-site scripting (XSS) vulnerability in the _keyify
  function in mistune.py allowed remote attackers to inject arbitrary web script
  or HTML by leveraging failure to escape the "key" argument (bsc#1072307).
- CVE-2017-15612: Prevent XSS via an unexpected newline (such as in
  java\nscript:) or a crafted email address, related to the escape and autolink
  functions (bsc#1064640).

These non-security issues were fixed:

- Fix nested html issue
- Fix _keyify with lower case.
- Remove non breaking spaces preprocessing
- Remove rev and rel attribute for footnotes
- Fix escape_link method 
- Handle block HTML with no content 
- Use expandtabs for tab
- Fix escape option for text renderer
- Fix HTML attribute regex pattern
- Fix strikethrough regex
- Fix HTML attribute regex
- Fix close tag regex
- Fix hard_wrap options on renderer.
- Fix emphasis regex pattern
- Fix base64 image link 
- Fix link security per
- Fix inline html when there is no content per 
</description>
  <summary>Security update for python-mistune</summary>
</patchinfo>
openSUSE Build Service is sponsored by