File _patchinfo of Package patchinfo
<patchinfo incident="7726"> <issue id="1072307" tracker="bnc">VUL-0: CVE-2017-16876: python-mistune: Cross-site-scripting</issue> <issue id="1064640" tracker="bnc">VUL-0: CVE-2017-15612: python-mistune: XSS via an unexpected newline / crafted email address</issue> <issue id="2017-15612" tracker="cve" /> <issue id="2017-16876" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>scarabeus_iv</packager> <description>This update for python-mistune to version 0.8.3 fixes several issues. These security issues were fixed: - CVE-2017-16876: Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py allowed remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the "key" argument (bsc#1072307). - CVE-2017-15612: Prevent XSS via an unexpected newline (such as in java\nscript:) or a crafted email address, related to the escape and autolink functions (bsc#1064640). These non-security issues were fixed: - Fix nested html issue - Fix _keyify with lower case. - Remove non breaking spaces preprocessing - Remove rev and rel attribute for footnotes - Fix escape_link method - Handle block HTML with no content - Use expandtabs for tab - Fix escape option for text renderer - Fix HTML attribute regex pattern - Fix strikethrough regex - Fix HTML attribute regex - Fix close tag regex - Fix hard_wrap options on renderer. - Fix emphasis regex pattern - Fix base64 image link - Fix link security per - Fix inline html when there is no content per </description> <summary>Security update for python-mistune</summary> </patchinfo>