Bug 57918 - python-tornado: Multiple issues (5.2)
Summary: python-tornado: Multiple issues (5.2)
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 5.2
Hardware: All Linux
: P3 normal
Target Milestone: UCS 5.2-0-errata
Assignee: Quality Assurance
QA Contact: Dirk Wiesenthal
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2025-01-30 16:50 CET by Quality Assurance
Modified: 2025-08-27 16:11 CEST (History)
1 user (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score: 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2025-01-30 16:50:37 CET
New Debian python-tornado 6.2.0-3+deb12u1 fixes:
This update addresses the following issues:
* python-tornado: open redirect vulnerability in StaticFileHandler under  certain configurations (CVE-2023-28370)
* python-tornado: Tornado has HTTP cookie parsing DoS vulnerability  (CVE-2024-52804)
Comment 1 Quality Assurance univentionstaff 2025-01-30 17:00:20 CET
--- mirror/ftp/pool/main/p/python-tornado/python-tornado_6.2.0-3.dsc
+++ apt/ucs_5.2-0-errata5.2-0/source/python-tornado_6.2.0-3+deb12u1.dsc
@@ -1,3 +1,19 @@
+6.2.0-3+deb12u1 [Tue, 31 Dec 2024 01:53:59 +0100] Daniel Leidert <dleidert@debian.org>:
+
+  * Non-maintainer upload by the Debian LTS team.
+  * d/patches/CVE-2024-52804.patch: Fix CVE-2024-52804 (closes: #1088112).
+    - The algorithm used for parsing HTTP cookies in Tornado versions prior to
+      6.4.2 sometimes has quadratic complexity, leading to excessive CPU
+      consumption when parsing maliciously-crafted cookie headers. This
+      parsing occurs in the event loop thread and may block the processing of
+      other requests.
+  * d/patches/CVE-2023-28370-1.patch,
+    d/patches/CVE-2023-28370-2.patch: Fix CVE-2023-28370 (closes: #1036875).
+    - Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows
+      a remote unauthenticated attacker to redirect a user to an arbitrary web
+      site and conduct a phishing attack by having user access a specially
+      crafted URL.
+
 6.2.0-3 [Sun, 20 Nov 2022 12:24:11 +0000] Jelmer Vernooij <jelmer@debian.org>:
 
   [ Debian Janitor ]

<http://piuparts.knut.univention.de/5.2-0/#3322161474033559872>
Comment 2 Iván.Delgado univentionstaff 2025-02-03 13:09:28 CET
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.2-0] 6b92ff5e36 Bug #57918: python-tornado 6.2.0-3+deb12u1
 doc/errata/staging/python-tornado.yaml | 16 ++++++++++++++++
 1 file changed, 16 insertions(+)
Comment 3 Iván.Delgado univentionstaff 2025-02-05 15:53:52 CET
<https://errata.software-univention.de/#/?erratum=5.2x14>
Comment 4 Arvid Requate univentionstaff 2025-08-27 16:11:53 CEST
*** Bug 58546 has been marked as a duplicate of this bug. ***