-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.2434
                         waitress security update
                                18 May 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           waitress
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-24761  

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2022/msg00106.html

Comment: CVSS (Max):  7.5 CVE-2022-24761 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
         CVSS Source: NVD
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5138-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
May 17, 2022                          https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : waitress
CVE ID         : CVE-2022-24761
Debian Bug     : 1008013

It was discovered that the Waitress WSGI server was susceptible to
HTTP request smuggling in some scenarios when used behind a proxy.

For the oldstable distribution (buster), this problem has been fixed
in version 1.2.0~b2-2+deb10u1.

For the stable distribution (bullseye), this problem has been fixed in
version 1.4.4-1.1+deb11u1.

We recommend that you upgrade your waitress packages.

For the detailed security status of waitress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/waitress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=zbZ1
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=cK50
-----END PGP SIGNATURE-----