SUSE SLED12 Security Update : python-tornado (SUSE-SU-2016:1195-1)

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

The python-tornado module was updated to version 4.2.1, which brings
several fixes, enhancements and new features.

The following security issues have been fixed :

- A path traversal vulnerability in StaticFileHandler, in
which files whose names started with the static_path
directory but were not actually in that directory could
be accessed.

- The XSRF token is now encoded with a random mask on each
request. This makes it safe to include in compressed
pages without being vulnerable to the BREACH attack.
This applies to most applications that use both the
xsrf_cookies and gzip options (or have gzip applied by a
proxy). (bsc#930362, CVE-2014-9720)

- The signed-value format used by
RequestHandler.{g,s}et_secure_cookie changed to be more
secure. (bsc#930361)

The following enhancements have been implemented :

- SSLIOStream.connect and IOStream.start_tls now validate
certificates by default.

- Certificate validation will now use the system CA root

- The default SSL configuration has become stricter, using
ssl.create_default_context where available on the client

- The deprecated classes in the tornado.auth module,
GoogleMixin, FacebookMixin and FriendFeedMixin have been

- New modules have been added: tornado.locks and

- The tornado.websocket module now supports compression
via the 'permessage-deflate' extension.

- Tornado now depends on the backports.ssl_match_hostname
when running on Python 2.

For a comprehensive list of changes, please refer to the release
notes :





Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Workstation Extension 12-SP1 :

zypper in -t patch SUSE-SLE-WE-12-SP1-2016-589=1

SUSE Linux Enterprise Workstation Extension 12 :

zypper in -t patch SUSE-SLE-WE-12-2016-589=1

SUSE Linux Enterprise Desktop 12-SP1 :

zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-589=1

SUSE Linux Enterprise Desktop 12 :

zypper in -t patch SUSE-SLE-DESKTOP-12-2016-589=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

Low / CVSS Base Score : 2.6
CVSS Temporal Score : 2.5
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 90883 ()

Bugtraq ID:

CVE ID: CVE-2014-9720

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now