Bug 57850 - python-tornado: Multiple issues (5.0)
Summary: python-tornado: Multiple issues (5.0)
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 5.0
Hardware: All Linux
: P3 normal
Target Milestone: UCS 5.0-9-errata
Assignee: Quality Assurance
QA Contact: Iván.Delgado
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2025-01-13 16:30 CET by Quality Assurance
Modified: 2025-01-15 14:28 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score: 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2025-01-13 16:30:46 CET
New Debian python-tornado 5.1.1-4+deb10u1A~5.0.9.202501131630 fixes:
This update addresses the following issues:
5.1.1-4+deb10u1 (Wed, 01 Jan 2025 18:38:27 +0100)
* Non-maintainer upload by the Debian LTS Team.
* d/patches/CVE-2024-52804.patch: Fix CVE-2024-52804. - The algorithm used  for parsing HTTP cookies in Tornado versions prior to 6.4.2 sometimes has  quadratic complexity, leading to excessive CPU consumption when parsing  maliciously-crafted cookie headers. This parsing occurs in the event loop  thread and may block the processing of other requests.
* d/patches/CVE-2023-28370-1.patch, d/patches/CVE-2023-28370-2.patch: Fix  CVE-2023-28370. - Open redirect vulnerability in Tornado versions 6.3.1 and  earlier allows a remote unauthenticated attacker to redirect a user to an  arbitrary web site and conduct a phishing attack by having user access a  specially crafted URL.
Comment 1 Quality Assurance univentionstaff 2025-01-13 17:00:35 CET
--- mirror/ftp/pool/main/p/python-tornado/python-tornado_5.1.1-4A~5.0.0.202306081314.dsc
+++ apt/ucs_5.0-0-errata5.0-9/source/python-tornado_5.1.1-4+deb10u1A~5.0.9.202501131630.dsc
@@ -1,10 +1,26 @@
-5.1.1-4A~5.0.0.202306081314 [Thu, 08 Jun 2023 13:14:16 +0200] Univention builddaemon <buildd@univention.de>:
+5.1.1-4+deb10u1A~5.0.9.202501131630 [Mon, 13 Jan 2025 16:31:13 -0000] Univention builddaemon <buildd@univention.de>:
 
   * UCS auto build. The following patches have been applied to the original source package
     2971.quilt
     3068.quilt
     3072.quilt
 
+5.1.1-4+deb10u1 [Wed, 01 Jan 2025 18:38:27 +0100] Daniel Leidert <dleidert@debian.org>:
+
+  * Non-maintainer upload by the Debian LTS Team.
+  * d/patches/CVE-2024-52804.patch: Fix CVE-2024-52804 (closes: #1088112).
+    - The algorithm used for parsing HTTP cookies in Tornado versions prior to
+      6.4.2 sometimes has quadratic complexity, leading to excessive CPU
+      consumption when parsing maliciously-crafted cookie headers. This
+      parsing occurs in the event loop thread and may block the processing of
+      other requests.
+  * d/patches/CVE-2023-28370-1.patch,
+    d/patches/CVE-2023-28370-2.patch: Fix CVE-2023-28370 (closes: #1036875).
+    - Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows
+      a remote unauthenticated attacker to redirect a user to an arbitrary web
+      site and conduct a phishing attack by having user access a specially
+      crafted URL.
+
 5.1.1-4 [Sat, 26 Jan 2019 13:15:05 +0100] Ondřej Nový <onovy@debian.org>:
 
   * d/patches/0007-Higher-test_gc-timeout.patch: Added, fixies FTBS on mipsel

<http://piuparts.knut.univention.de/5.0-9/#3915666271734948860>
Comment 2 Iván.Delgado univentionstaff 2025-01-14 08:04:47 CET
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-9] cb211a3677 Bug #57850: python-tornado 5.1.1-4+deb10u1A~5.0.9.202501131630
 doc/errata/staging/python-tornado.yaml | 16 ++++++++++++++++
 1 file changed, 16 insertions(+)