openSUSE2021:0571-1: important: Security update for python-bleach

openSUSE Security Update: Security update for python-bleach ______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0571-1 Rating: important References: #1167379 #1168280 #1184547 Cross-References: CVE-2020-6816 CVE-2020-6817 CVE-2021-23980
CVSS scores: CVE-2020-6816 (NVD) : 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVE-2021-23980 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products: openSUSE Backports SLE-15-SP2 ______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for python-bleach fixes the following issues:
– CVE-2021-23980: Fixed mutation XSS on bleach.clean with specific combinations of allowed tags (boo#1184547)
Update to 3.1.5:
* replace missing “setuptools“ dependency with “packaging“. Thank you Benjamin Peterson.
Update to 3.1.4 (boo#1168280, CVE-2020-6817):
* “bleach.clean“ behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to “bleach.clean“ with an allowed tag with an allowed “style“ attribute were vulnerable to ReDoS. For example, “bleach.clean(…, attributes={‘a’: [‘style’]})“. * Style attributes with dashes, or single or double quoted values are cleaned instead of passed through.
update to 3.1.3 (boo#1167379, CVE-2020-6816):
* Add relative link to code of conduct. (#442) * Drop deprecated ‘setup.py test’ support. (#507) * Fix typo: curren -> current in tests/test_clean.py (#504) * Test on PyPy 7 * Drop test support for end of life Python 3.4 * “bleach.clean“ behavior parsing embedded MathML and SVG content with RCDATA tags did not match browser behavior and could result in a mutation XSS. Calls to “bleach.clean“ with “strip=False“ and “math“ or “svg“ tags and one or more of the RCDATA tags “script“, “noscript“, “style“, “noframes“, “iframe“, “noembed“, or “xmp“ in the allowed tags whitelist were vulnerable to a mutation XSS.
This update was imported from the openSUSE:Leap:15.2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2021-571=1

Package List:
– openSUSE Backports SLE-15-SP2 (noarch):
python2-bleach-3.1.5-bp152.2.4.1 python3-bleach-3.1.5-bp152.2.4.1
References:
www.suse.com/security/cve/CVE-2020-6816.html www.suse.com/security/cve/CVE-2020-6817.html www.suse.com/security/cve/CVE-2021-23980.html bugzilla.suse.com/1167379 bugzilla.suse.com/1168280 bugzilla.suse.com/1184547