USN-5354-1: Twisted vulnerabilities
30 March 2022
Several security issues were fixed in Twisted.
Releases
Packages
- twisted - Event-based framework for internet applications
Details
It was discovered that Twisted incorrectly filtered HTTP headers when clients
are being redirected to another origin. A remote attacker could use this issue
to obtain sensitive information. (CVE-2022-21712)
It was discovered that Twisted incorrectly processed SSH handshake data on
connection establishments. A remote attacker could use this issue to cause
Twisted to crash, resulting in a denial of service. (CVE-2022-21716)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.10
Ubuntu 20.04
Ubuntu 18.04
-
python3-twisted
-
17.9.0-2ubuntu0.3
-
python3-twisted-bin
-
17.9.0-2ubuntu0.3
-
python-twisted
-
17.9.0-2ubuntu0.3
-
python-twisted-bin
-
17.9.0-2ubuntu0.3
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5354-2: python-twisted-names, twisted, python-twisted-news, python-twisted-mail, python-twisted-core, python-twisted-runner, python-twisted-words, python-twisted-lore, python-twisted-bin, twisted-doc, python-twisted-web, python-twisted, python-twisted-conch, python3-twisted