USN-4308-2: Twisted vulnerabilities
30 March 2020
Several security issues were fixed in Twisted.
Releases
Packages
- twisted - Event-based framework for internet applications
Details
USN-4308-1 fixed several vulnerabilities in Twisted. This update provides
the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
it was discovered that Twisted incorrectly validated or sanitized certain
URIs or HTTP methods. A remote attacker could use this issue to inject
invalid characters and possibly perform header injection attacks.
(CVE-2019-12387)
It was discovered that Twisted incorrectly verified XMPP TLS certificates.
A remote attacker could possibly use this issue to perform a
machine-in-the-middle attack and obtain sensitive information. (CVE-2019-12855)
Jake Miller and ZeddYu Lu discovered that Twisted incorrectly handled
certain content-length headers. A remote attacker could possibly use this
issue to perform HTTP request splitting attacks. (CVE-2020-10108,
CVE-2020-10109)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
python-twisted
-
13.2.0-1ubuntu1.2+esm1
-
python-twisted-bin
-
13.2.0-1ubuntu1.2+esm1
-
python-twisted-web
-
13.2.0-1ubuntu1.2+esm1
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4308-1: python-twisted-words, python3-twisted-bin, twisted-doc, python-twisted-mail, python-twisted-bin, twisted, python-twisted-runner, python-twisted, python3-twisted, python-twisted-names, python-twisted-news, python-twisted-conch, python-twisted-core, python-twisted-web