First published: Wed Dec 11 2024(Updated: )
It was discovered that Tornado incorrectly handled a certain redirect. A remote attacker could possibly use this issue to redirect a user to an arbitrary web site and conduct a phishing attack by having the user access a specially crafted URL. This issue was only addressed in Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 18.04 LTS. Ubuntu 16.04 LTS was previously addressed in USN-6159-1. (CVE-2023-28370) It was discovered that Tornado inefficiently handled requests when parsing cookies. An attacker could possibly use this issue to increase resource utilization leading to a denial of service. (CVE-2024-52804)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3-tornado | <6.4.1-2ubuntu0.1 | 6.4.1-2ubuntu0.1 |
Ubuntu Ubuntu | =24.10 | |
All of | ||
ubuntu/python3-tornado | <6.4.0-1ubuntu0.1 | 6.4.0-1ubuntu0.1 |
Ubuntu Ubuntu | =24.04 | |
All of | ||
ubuntu/python3-tornado | <6.1.0-3ubuntu0.1~esm1 | 6.1.0-3ubuntu0.1~esm1 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/python3-tornado | <6.0.3+really5.1.1-3ubuntu0.1~esm1 | 6.0.3+really5.1.1-3ubuntu0.1~esm1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/python-tornado | <4.5.3-1ubuntu0.2+esm1 | 4.5.3-1ubuntu0.2+esm1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/python3-tornado | <4.5.3-1ubuntu0.2+esm1 | 4.5.3-1ubuntu0.2+esm1 |
Ubuntu Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.