Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 917768 (CVE-2023-46136)

Summary: <dev-python/werkzeug-{2.3.8,3.0.1}: DoS via malformed multipart data
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: IN_PROGRESS ---    
Severity: minor CC: mgorny, python
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://github.com/pallets/werkzeug/security/advisories/GHSA-hrfv-mqp8-q5rw
Whiteboard: B3 [glsa?]
Package list:
Runtime testing required: ---
Bug Depends on: 917771    
Bug Blocks:    

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-11-22 23:57:18 UTC
CVE-2023-46136:

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

Please cleanup.
Comment 1 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2023-11-24 18:48:17 UTC
cleanup done.