Lucene search

K
debianDebianDEBIAN:DSA-5470-1:C41EC
HistoryAug 06, 2023 - 12:39 p.m.

[SECURITY] [DSA 5470-1] python-werkzeug security update

2023-08-0612:39:03
lists.debian.org
5

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

48.6%


Debian Security Advisory DSA-5470-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
August 06, 2023 https://www.debian.org/security/faq


Package : python-werkzeug
CVE ID : CVE-2023-23934 CVE-2023-25577
Debian Bug : 1031370

Several vulnerabilities were discovered in python-werkzeug, a collection
of utilities for WSGI applications.

CVE-2023-23934

It was discovered that Werkzeug did not properly handle the parsing
of nameless cookies which may allow shadowing of other cookies.

CVE-2023-25577

It was discovered that Werkzeug could parse unlimited number of
parts, including file parts, which may result in denial of service.

For the oldstable distribution (bullseye), these problems have been fixed
in version 1.0.1+dfsg1-2+deb11u1.

We recommend that you upgrade your python-werkzeug packages.

For the detailed security status of python-werkzeug please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/python-werkzeug

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

48.6%