Update to 4.4.2: Security fixes * A difference in cookie parsing between Tornado and web browsers (especially when combined with Google Analytics) could allow an attacker to set arbitrary cookies and bypass XSRF protection. The cookie parser has been rewritten to fix this attack. Backwards-compatibility notes * Cookies containing certain special characters (in particular semicolon and square brackets) are now parsed differently. * If the cookie header contains a combination of valid and invalid cookies, the valid ones will be returned (older versions of Tornado would reject the entire header for a single invalid cookie).
Fixed by Philippe in mga5 updates_testing SRPMS: python-tornado-3.2.2-4.1.mga5
CC: (none) => mageia
Bug already filed yesterday. *** This bug has been marked as a duplicate of bug 19859 ***
Status: NEW => RESOLVEDResolution: (none) => DUPLICATE