| Summary: | python-tornado new security issue CVE-2014-9720 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | davidwhodgins, makowski.mageia, shlomif, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/647618/ | ||
| Whiteboard: | MGA4-64-OK has_procedure MGA4-32-OK advisory | ||
| Source RPM: | python-tornado-3.1-4.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-06-09 18:58:39 CEST
Updated packages uploaded for Mageia 4.
Advisory:
========================
Updated python-tornado
packages fix security vulnerabilities:
Security fixes (CVE-2014-9720)
The XSRF token is now encoded with a random mask on each request. This makes it safe to include in compressed pages without being vulnerable to the BREACH attack. This applies to most applications that use both the xsrf_cookies and gzip options (or have gzip applied by a proxy).
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1222816
- http://lwn.net/Vulnerabilities/647618/
Updated packages in core/updates_testing:
========================
python-tornado-3.1-4.1.mga4.noarch.rpm
python3-tornado-doc-3.1-4.1.mga4.noarch.rpm
python-tornado-doc-3.1-4.1.mga4.noarch.rpm
python3-tornado-3.1-4.1.mga4.noarch.rpm
From
python-tornado-3.1-4.1.mga4.src.rpmAssignee:
makowski.mageia =>
qa-bugs Thanks Philippe! The References should be: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9720 https://lists.fedoraproject.org/pipermail/package-announce/2015-June/159805.html
David Walser
2015-06-14 16:35:05 CEST
CC:
(none) =>
makowski.mageia Testing procedure: https://bugs.mageia.org/show_bug.cgi?id=6165#c3 Whiteboard:
(none) =>
has_procedure (In reply to David Walser from comment #3) > Testing procedure: > https://bugs.mageia.org/show_bug.cgi?id=6165#c3 Tested on MGA4 x86-64 in a VBox VM. Works fine with both Python 2.x and Python 3.x. CC:
(none) =>
shlomif fine on an i586 VBox VM. Marking as MGA4-32-OK. Whiteboard:
MGA4-64-OK has_procedure =>
MGA4-64-OK has_procedure MGA4-32-OK
Dave Hodgins
2015-06-25 10:11:42 CEST
Keywords:
(none) =>
validated_update Someone from the sysadmin team please push 16100.adv to updates on Mageia 4. An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0251.html Status:
NEW =>
RESOLVED |