CVE-2020-28476

Publication date 18 January 2021

Last updated 4 August 2025


Ubuntu priority

Cvss 3 Severity Score

6.8 · Medium

Score breakdown

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-23336. Reason: This candidate is a reservation duplicate of CVE-2021-23336. Notes: All CVE users should reference CVE-2021-23336 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage

Read the notes from the security team

Status

Package Ubuntu Release Status
python-tornado 20.10 groovy Ignored end of life, was deferred
20.04 LTS focal
Vulnerable, fix deferred
18.04 LTS bionic
Vulnerable, fix deferred
16.04 LTS xenial
Vulnerable, fix deferred
14.04 LTS trusty Not in release
python-tornado4 20.10 groovy Not in release
20.04 LTS focal
Vulnerable, fix deferred
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release

Notes


mdeslaur

per tornado developers, this isn't an issue in tornado itself, but in the python standard library. as of 2021-01-29, no details on possible fix from upstream

Severity score breakdown

Parameter Value
Base score 6.8 · Medium
Attack vector Network
Attack complexity High
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H