Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 917768 (CVE-2023-46136) - <dev-python/werkzeug-{2.3.8,3.0.1}: DoS via malformed multipart data
Summary: <dev-python/werkzeug-{2.3.8,3.0.1}: DoS via malformed multipart data
Status: IN_PROGRESS
Alias: CVE-2023-46136
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://github.com/pallets/werkzeug/s...
Whiteboard: B3 [glsa?]
Keywords:
Depends on: 917771
Blocks:
  Show dependency tree
 
Reported: 2023-11-22 23:57 UTC by John Helmert III
Modified: 2023-11-24 19:32 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-11-22 23:57:18 UTC
CVE-2023-46136:

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

Please cleanup.
Comment 1 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2023-11-24 18:48:17 UTC
cleanup done.