Your message dated Sat, 17 May 2025 09:37:58 +0000 with message-id <E1uGDzS-005KJx-Sx@coccia.debian.org> and subject line Close 1102974 has caused the Debian Bug report #1102974, regarding bookworm-pu: package twitter-bootstrap4/4.6.1+dfsg1-4+deb12u1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1102974: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102974 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: bookworm-pu: package twitter-bootstrap4/4.6.1+dfsg1-4+deb12u1
- From: Bastien Roucaries <rouca@debian.org>
- Date: Sun, 13 Apr 2025 14:53:57 +0200
- Message-id: <6103794.kQq0lBPeGt@debian-ei>
Package: release.debian.org Severity: normal Tags: bookworm X-Debbugs-Cc: twitter-bootstrap4@packages.debian.org Control: affects -1 + src:twitter-bootstrap4 User: release.debian.org@packages.debian.org Usertags: pu [ Reason ] CVE-2024-6531 [ Impact ] CVE-2024-6531 is not closed [ Tests ] No but it tested the PoC [ Risks ] Low [ Checklist ] [X] *all* changes are documented in the d/changelog [X] I reviewed all changes and I approve them [X] attach debdiff against the package in (old)stable [X] the issue is verified as fixed in unstable [ Changes ] CVE-2024-6531 [ Other info ] May need a rebuilt of webpacked/bundled packagediff -Nru twitter-bootstrap4-4.6.1+dfsg1/debian/changelog twitter-bootstrap4-4.6.1+dfsg1/debian/changelog --- twitter-bootstrap4-4.6.1+dfsg1/debian/changelog 2022-11-25 06:37:10.000000000 +0100 +++ twitter-bootstrap4-4.6.1+dfsg1/debian/changelog 2025-04-13 13:42:02.000000000 +0200 @@ -1,3 +1,21 @@ +twitter-bootstrap4 (4.6.1+dfsg1-4+deb12u1) bookworm; urgency=high + + * Team upload + * Fix CVE-2024-6531 (XSS vulnerability): + An anchor element (<a>), when used for carousel navigation + with a data-slide attribute, can contain an href attribute + value that is not subject to proper content sanitization. + Improper extraction of the intended target carousel’s + #id from the href attribute can lead to use cases where + the click event’s preventDefault() + is not applied and the href is evaluated and executed. + As a result, restrictions are not applied to the data + that is evaluated, which can lead to potential + XSS vulnerabilities. + (Closes: #1084059) + + -- Bastien Roucariès <rouca@debian.org> Sun, 13 Apr 2025 13:42:02 +0200 + twitter-bootstrap4 (4.6.1+dfsg1-4) unstable; urgency=medium * Team upload diff -Nru twitter-bootstrap4-4.6.1+dfsg1/debian/patches/0003-CVE-2024-6531.patch twitter-bootstrap4-4.6.1+dfsg1/debian/patches/0003-CVE-2024-6531.patch --- twitter-bootstrap4-4.6.1+dfsg1/debian/patches/0003-CVE-2024-6531.patch 1970-01-01 01:00:00.000000000 +0100 +++ twitter-bootstrap4-4.6.1+dfsg1/debian/patches/0003-CVE-2024-6531.patch 2025-04-13 13:42:02.000000000 +0200 @@ -0,0 +1,45 @@ +From: =?utf-8?q?Bastien_Roucari=C3=A8s?= <rouca@debian.org> +Date: Sun, 13 Apr 2025 12:33:22 +0200 +Subject: CVE-2024-6531 +MIME-Version: 1.0 +Content-Type: text/plain; charset="utf-8" +Content-Transfer-Encoding: 8bit + +An anchor element (<a>), when used for carousel navigation with a data-slide attribute, +can contain an href attribute value that is not subject to proper content sanitization. +Improper extraction of the intended target carousel’s #id from the href attribute +can lead to use cases where the click event’s preventDefault() +is not applied and the href is evaluated and executed. +As a result, restrictions are not applied to the data that is evaluated, which +can lead to potential XSS vulnerabilities. + +return false in case of error that will avoid the XSS attack, and avoid further +treatment by the handler. + +bug: https://www.herodevs.com/vulnerability-directory/cve-2024-6531 +bug-debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1084059 +bug-debian-security: https://security-tracker.debian.org/tracker/CVE-2024-6531 +--- + js/src/carousel.js | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/js/src/carousel.js b/js/src/carousel.js +index 18732d0..9447da6 100644 +--- a/js/src/carousel.js ++++ b/js/src/carousel.js +@@ -543,13 +543,13 @@ class Carousel { + const selector = Util.getSelectorFromElement(this) + + if (!selector) { +- return ++ return false + } + + const target = $(selector)[0] + + if (!target || !$(target).hasClass(CLASS_NAME_CAROUSEL)) { +- return ++ return false + } + + const config = { diff -Nru twitter-bootstrap4-4.6.1+dfsg1/debian/patches/series twitter-bootstrap4-4.6.1+dfsg1/debian/patches/series --- twitter-bootstrap4-4.6.1+dfsg1/debian/patches/series 2021-07-30 06:53:16.000000000 +0200 +++ twitter-bootstrap4-4.6.1+dfsg1/debian/patches/series 2025-04-13 13:42:02.000000000 +0200 @@ -1,2 +1,3 @@ do-not-update-copyright-year.diff dont-check-for-caniuse-lite-update.patch +0003-CVE-2024-6531.patchAttachment: signature.asc
Description: This is a digitally signed message part.
--- End Message ---
--- Begin Message ---
- To: 1102974-done@bugs.debian.org
- Subject: Close 1102974
- From: jmw@debian.org
- Date: Sat, 17 May 2025 09:37:58 +0000
- Message-id: <E1uGDzS-005KJx-Sx@coccia.debian.org>
Version: 12.11 This update has been released as part of 12.10. Thank you for your contribution.
--- End Message ---