Your message dated Sat, 28 May 2022 18:32:32 +0000
with message-id <[email protected]>
and subject line Bug#1008013: fixed in waitress 1.4.4-1.1+deb11u1
has caused the Debian Bug report #1008013,
regarding waitress: CVE-2022-24761
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1008013: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008013
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: waitress
Version: 1.4.4-1.1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for waitress.

CVE-2022-24761[0]:
| Waitress is a Web Server Gateway Interface server for Python 2 and 3.
| When using Waitress versions 2.1.0 and prior behind a proxy that does
| not properly validate the incoming HTTP request matches the RFC7230
| standard, Waitress and the frontend proxy may disagree on where one
| request starts and where it ends. This would allow requests to be
| smuggled via the front-end proxy to waitress and later behavior. There
| are two classes of vulnerability that may lead to request smuggling
| that are addressed by this advisory: The use of Python's `int()` to
| parse strings into integers, leading to `+10` to be parsed as `10`, or
| `0x01` to be parsed as `1`, where as the standard specifies that the
| string should contain only digits or hex digits; and Waitress does not
| support chunk extensions, however it was discarding them without
| validating that they did not contain illegal characters. This
| vulnerability has been patched in Waitress 2.1.1. A workaround is
| available. When deploying a proxy in front of waitress, turning on any
| and all functionality to make sure that the request matches the
| RFC7230 standard. Certain proxy servers may not have this
| functionality though and users are encouraged to upgrade to the latest
| version of waitress instead.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-24761
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24761
[1] https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36
[2] 
https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: waitress
Source-Version: 1.4.4-1.1+deb11u1
Done: Stefano Rivera <[email protected]>

We believe that the bug you reported is fixed in the latest version of
waitress, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Stefano Rivera <[email protected]> (supplier of updated waitress package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 10 May 2022 17:14:39 -0400
Source: waitress
Architecture: source
Version: 1.4.4-1.1+deb11u1
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Python Team <[email protected]>
Changed-By: Stefano Rivera <[email protected]>
Closes: 1008013
Changes:
 waitress (1.4.4-1.1+deb11u1) bullseye-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * Security update, resolving a request smuggling vulnerability:
     When using previous Waitress versions behind a proxy that does not
     properly validate the incoming HTTP request matches the RFC7230 standard,
     Waitress and the frontend proxy may disagree on where one request starts
     and where it ends. This would allow requests to be smuggled via the
     front-end proxy to waitress and later behavior.
     CVE-2022-24761 (Closes: #1008013)
Checksums-Sha1:
 fe81a3ae71986397dc039ee88e6f67a5f4c31cbf 1582 waitress_1.4.4-1.1+deb11u1.dsc
 7edf00b8c7c5064cc5d736bd1b52d36f42abbf77 168781 waitress_1.4.4.orig.tar.gz
 ac909efccd6367f26aac5f7f6fc4881d9c04586a 11004 
waitress_1.4.4-1.1+deb11u1.debian.tar.xz
 c315a90a88ee5f58a75b50480d88a2eb5b4f2074 7069 
waitress_1.4.4-1.1+deb11u1_source.buildinfo
Checksums-Sha256:
 98f35bcb5a55aaa4f479ae53094910df54eceadebe0d7e0c057d9d553a6c0ac5 1582 
waitress_1.4.4-1.1+deb11u1.dsc
 857d94a0f87954bceb954c8685c94565eb59ac5a81229ba252e2f86dab182d6d 168781 
waitress_1.4.4.orig.tar.gz
 3b42a8ae3676492b3ec546709a5aee9defb568ea2846a39131ed6f0c29e25eb4 11004 
waitress_1.4.4-1.1+deb11u1.debian.tar.xz
 9eb4d91c231fb2962bf6b6b3dbc584b9a9f7fbdf7d5f928d9d1be2f38c926b23 7069 
waitress_1.4.4-1.1+deb11u1_source.buildinfo
Files:
 5592eb765298a10e5bee446cf32302ba 1582 python optional 
waitress_1.4.4-1.1+deb11u1.dsc
 dc4dabf509e5e909cb11dd38c0708f66 168781 python optional 
waitress_1.4.4.orig.tar.gz
 3a48564809ce6fab8fa2325a1e3f4a16 11004 python optional 
waitress_1.4.4-1.1+deb11u1.debian.tar.xz
 4a0f033398d31733f342dda918635c07 7069 python optional 
waitress_1.4.4-1.1+deb11u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iIoEARYKADIWIQTumtb5BSD6EfafSCRHew2wJjpU2AUCYn7H7xQcc3RlZmFub3JA
ZGViaWFuLm9yZwAKCRBHew2wJjpU2LdMAQD/GnlkeJndNlajquxU/V4xWhMXMSty
h3S/yhsndvoLBQD/cGx0dqX/dXlvV5DlzazQzEfzP22kc3CeMs2wRXt6XwY=
=qAHv
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to