Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 942200 (CVE-2024-49767) - <dev-python/werkzeug-3.0.6, <dev-python/quart-0.19.7: possible resource exhaustion when parsing file data in forms
Summary: <dev-python/werkzeug-3.0.6, <dev-python/quart-0.19.7: possible resource exhau...
Status: CONFIRMED
Alias: CVE-2024-49767
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: https://github.com/advisories/GHSA-q3...
Whiteboard: B3 [glsa?]
Keywords:
Depends on: 942198 942199
Blocks:
  Show dependency tree
 
Reported: 2024-10-26 05:41 UTC by Michał Górny
Modified: 2024-10-27 07:08 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2024-10-26 05:41:46 UTC
Applications using Werkzeug to parse multipart/form-data requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the Request.max_form_memory_size setting.

The Request.max_content_length setting, as well as resource limits provided by deployment software and platforms, are also available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.
Comment 1 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2024-10-26 10:15:24 UTC
cleanup done