Prior to version 22.4.0rc1, the Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230. This non-conformant parsing can lead to desync if requests pass through multiple HTTP parsers, potentially resulting in HTTP request smuggling. Users who may be affected use Twisted Web's HTTP 1.1 server and/or proxy and also pass requests through a different HTTP server and/or proxy. Reference: https://github.com/twisted/twisted/security/advisories/GHSA-c2jg-hw38-jrqq
Created python-twisted tracking bugs for this issue: Affects: epel-8 [bug 2073116] Affects: fedora-all [bug 2073115]
Red Hat Enterprise Linux 6 was affected but Out of Support Cycle because python-twisted was not listed in Red Hat Enterprise Linux 6 ELS Inclusion List. Ref: https://access.redhat.com/articles/4997301
Advisory: https://github.com/twisted/twisted/security/advisories/GHSA-c2jg-hw38-jrqq Upstream Patch: https://github.com/twisted/twisted/commit/592217e951363d60e9cd99c5bbfd23d4615043ac
This issue has been addressed in the following products: Red Hat OpenStack Platform 16.2 Via RHSA-2022:1645 https://access.redhat.com/errata/RHSA-2022:1645
This issue has been addressed in the following products: Red Hat OpenStack Platform 16.1 Via RHSA-2022:1646 https://access.redhat.com/errata/RHSA-2022:1646
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-24801
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:4930 https://access.redhat.com/errata/RHSA-2022:4930