Operating System:

[RedHat]

Published:

17 December 2020

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.4453
               python-XStatic-Bootstrap-SCSS security update
                             17 December 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           python-XStatic-Bootstrap-SCSS
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Cross-site Scripting     -- Remote with User Interaction
                   Access Confidential Data -- Remote with User Interaction
                   Reduced Security         -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-8331 CVE-2018-20677 CVE-2018-20676
                   CVE-2018-14042 CVE-2016-10735 

Reference:         ESB-2020.3902
                   ESB-2020.3368
                   ESB-2019.3808

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2020:5571

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: python-XStatic-Bootstrap-SCSS security update
Advisory ID:       RHSA-2020:5571-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:5571
Issue date:        2020-12-16
CVE Names:         CVE-2016-10735 CVE-2018-14042 CVE-2018-20676 
                   CVE-2018-20677 CVE-2019-8331 
=====================================================================

1. Summary:

An update for python-XStatic-Bootstrap-SCSS is now available for Red Hat
OpenStack Platform 13 (Queens).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 13.0 - noarch
Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server - noarch

3. Description:

python-XStatic-Bootstrap-SCSS is the Bootstrap-SCSS JavaScript library
packaged for setuptools / pip.

Security Fix(es):

* XSS in the data-target attribute (CVE-2016-10735)

* Cross-site Scripting (XSS) in the data-container property of tooltip
(CVE-2018-14042)

* XSS in the tooltip data-viewport attribute (CVE-2018-20676)

* XSS in the affix configuration target property (CVE-2018-20677)

* XSS in the tooltip or popover data-template attribute (CVE-2019-8331)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1601617 - CVE-2018-14042 bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip
1668082 - CVE-2018-20676 bootstrap: XSS in the tooltip data-viewport attribute
1668089 - CVE-2018-20677 bootstrap: XSS in the affix configuration target property
1668097 - CVE-2016-10735 bootstrap: XSS in the data-target attribute
1686454 - CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template attribute

6. Package List:

Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server:

Source:
python-XStatic-Bootstrap-SCSS-3.4.1.0-1.el7ost.src.rpm

noarch:
python-XStatic-Bootstrap-SCSS-3.4.1.0-1.el7ost.noarch.rpm
xstatic-bootstrap-scss-common-3.4.1.0-1.el7ost.noarch.rpm

Red Hat OpenStack Platform 13.0:

Source:
python-XStatic-Bootstrap-SCSS-3.4.1.0-1.el7ost.src.rpm

noarch:
python-XStatic-Bootstrap-SCSS-3.4.1.0-1.el7ost.noarch.rpm
xstatic-bootstrap-scss-common-3.4.1.0-1.el7ost.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-10735
https://access.redhat.com/security/cve/CVE-2018-14042
https://access.redhat.com/security/cve/CVE-2018-20676
https://access.redhat.com/security/cve/CVE-2018-20677
https://access.redhat.com/security/cve/CVE-2019-8331
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=xZ7F
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=yyNt
-----END PGP SIGNATURE-----