File _patchinfo of Package patchinfo.22700

<patchinfo incident="22700">
  <issue tracker="bnc" id="1118088">VUL-1: CVE-2018-19787: python-lxml: lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks</issue>
  <issue tracker="bnc" id="1184177">VUL-0: CVE-2021-28957: python-lxml,python3-lxml:missing input sanitization for formaction HTML5 attributes may lead to XSS</issue>
  <issue tracker="bnc" id="1179534">VUL-0: CVE-2020-27783: python3-lxml,python-lxml: mXSS due to the use of improper parser</issue>
  <issue tracker="bnc" id="1193752">VUL-0: CVE-2021-43818: python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through</issue>
  <issue tracker="cve" id="2021-43818"/>
  <issue tracker="cve" id="2021-28957"/>
  <issue tracker="cve" id="2018-19787"/>
  <issue tracker="cve" id="2020-27783"/>
  <packager>thomas-schraitle</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for python-lxml</summary>
  <description>This update for python-lxml fixes the following issues:

- CVE-2018-19787: Fixed XSS vulnerability via unescaped URL (bsc#1118088).
- CVE-2021-28957: Fixed XSS vulnerability ia HTML5 attributes unescaped (bsc#1184177).
- CVE-2021-43818: Fixed XSS vulnerability via script content in SVG images using data URIs (bnc#1193752).
- CVE-2020-27783: Fixed mutation XSS with improper parser use (bnc#1179534).
</description>
</patchinfo>
openSUSE Build Service is sponsored by