An update for python-twisted is now available for openEuler-20.03-LTS-SP4
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1012
Final
1.0
1.0
2024-01-05
Initial
2024-01-05
2024-01-05
openEuler SA Tool V1.0
2024-01-05
python-twisted security update
An update for python-twisted is now available for openEuler-20.03-LTS-SP4.
Twisted is an event-based framework for internet applications, supporting Python 2.7 and Python 3.5+. It includes modules for many different purposes, including the following:
Security Fix(es):
Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc1, when sending multiple HTTP requests in one TCP packet, twisted.web will process the requests asynchronously without guaranteeing the response order. If one of the endpoints is controlled by an attacker, the attacker can delay the response on purpose to manipulate the response of the second request when a victim launched two requests using HTTP pipeline. Version 23.10.0rc1 contains a patch for this issue.(CVE-2023-46137)
An update for python-twisted is now available for openEuler-20.03-LTS-SP4.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
python-twisted
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1012
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-46137
https://nvd.nist.gov/vuln/detail/CVE-2023-46137
openEuler-20.03-LTS-SP4
python3-twisted-22.4.0-2.oe2003sp4.aarch64.rpm
python-twisted-help-22.4.0-2.oe2003sp4.noarch.rpm
python-twisted-22.4.0-2.oe2003sp4.src.rpm
python3-twisted-22.4.0-2.oe2003sp4.x86_64.rpm
Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc1, when sending multiple HTTP requests in one TCP packet, twisted.web will process the requests asynchronously without guaranteeing the response order. If one of the endpoints is controlled by an attacker, the attacker can delay the response on purpose to manipulate the response of the second request when a victim launched two requests using HTTP pipeline. Version 23.10.0rc1 contains a patch for this issue.
2024-01-05
CVE-2023-46137
openEuler-20.03-LTS-SP4
Medium
5.3
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
python-twisted security update
2024-01-05
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1012