Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2022.0168
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2022-0168)
Summary:The remote host is missing an update for the 'python-automat, python-incremental, python-twisted' package(s) announced via the MGASA-2022-0168 advisory.
Description:Summary:
The remote host is missing an update for the 'python-automat, python-incremental, python-twisted' package(s) announced via the MGASA-2022-0168 advisory.

Vulnerability Insight:
CVE-2022-21712: It was discovered that Twisted incorrectly filtered HTTP
headers when clients are being redirected to another origin. A remote
attacker could use this issue to obtain sensitive information.
CVE-2022-21716: It was discovered that Twisted incorrectly processed SSH
handshake data on connection establishments. A remote attacker could use
this issue to cause Twisted to crash, resulting in a denial of service.

GHSA-rv6r-3f5q-9rgx
The Twisted SSH client and server implementation naively accepted an
infinite amount of data for the peer's SSH version identifier.

GHSA-c2jg-hw38-jrqq and CVE-2022-24801
The Twisted Web HTTP 1.1 server, located in the twisted.web.http module,
parsed several HTTP request constructs more leniently than permitted by
RFC 7230

GHSA-92x2-jw7w-xvvx: twisted.web.client.getPage,
twisted.web.client.downladPage, and the associated implementation classes
(HTTPPageGetter, HTTPPageDownloader, HTTPClientFactory, HTTPDownloader)
have been removed because they do not segregate cookies by domain. They
were deprecated in Twisted 16.7.0 in favor of twisted.web.client.Agent.

Affected Software/OS:
'python-automat, python-incremental, python-twisted' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-21712
https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K/
https://security.gentoo.org/glsa/202301-02
https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2
https://github.com/twisted/twisted/releases/tag/twisted-22.1.0
https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-21716
https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx
https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9
https://github.com/twisted/twisted/releases/tag/twisted-22.2.0
https://twistedmatrix.com/trac/ticket/10284
https://www.oracle.com/security-alerts/cpuapr2022.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00009.html
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.