{"affected":[{"ecosystem_specific":{"binaries":[{"python2-waitress":"1.4.3-lp151.3.3.1","python3-waitress":"1.4.3-lp151.3.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.1","name":"python-waitress","purl":"pkg:rpm/opensuse/python-waitress&distro=openSUSE%20Leap%2015.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.4.3-lp151.3.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-waitress to 1.4.3 fixes the following security issues:\n\n- CVE-2019-16785: HTTP request smuggling through LF vs CRLF handling (bsc#1161088).\n- CVE-2019-16786: HTTP request smuggling through invalid Transfer-Encoding (bsc#1161089).\n- CVE-2019-16789: HTTP request smuggling through invalid whitespace characters (bsc#1160790).\n- CVE-2019-16792: HTTP request smuggling by sending the Content-Length header twice (bsc#1161670).\n\nThis update was imported from the SUSE:SLE-15:Update update project.","id":"openSUSE-SU-2020:1922-1","modified":"2020-11-14T17:27:37Z","published":"2020-11-14T17:27:37Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1160790"},{"type":"REPORT","url":"https://bugzilla.suse.com/1161088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1161089"},{"type":"REPORT","url":"https://bugzilla.suse.com/1161670"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-16785"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-16786"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-16789"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-16792"}],"related":["CVE-2019-16785","CVE-2019-16786","CVE-2019-16789","CVE-2019-16792"],"summary":"Security update for python-waitress","upstream":["CVE-2019-16785","CVE-2019-16786","CVE-2019-16789","CVE-2019-16792"]}