Headline
Ubuntu Security Notice USN-7093-1
Ubuntu Security Notice 7093-1 - It was discovered that Werkzeug incorrectly handled multiple form submission requests. A remote attacker could possibly use this issue to cause Werkzeug to consume resources, leading to a denial of service.
==========================================================================
Ubuntu Security Notice USN-7093-1
November 05, 2024
python-werkzeug vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Werkzeug could be made to consume resources if it received specially
crafted network traffic.
Software Description:
- python-werkzeug: collection of utilities for WSGI applications
Details:
It was discovered that Werkzeug incorrectly handled multiple form
submission requests. A remote attacker could possibly use this issue to
cause Werkzeug to consume resources, leading to a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.10
python3-werkzeug 3.0.3-1ubuntu0.1
Ubuntu 24.04 LTS
python3-werkzeug 3.0.1-3ubuntu0.2
Ubuntu 22.04 LTS
python3-werkzeug 2.0.2+dfsg1-1ubuntu0.22.04.3
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7093-1
CVE-2024-49767
Package Information:
https://launchpad.net/ubuntu/+source/python-werkzeug/3.0.3-1ubuntu0.1
https://launchpad.net/ubuntu/+source/python-werkzeug/3.0.1-3ubuntu0.2
https://launchpad.net/ubuntu/+source/python-werkzeug/2.0.2+dfsg1-1ubuntu0.22.04.3
Related news
Applications using Werkzeug to parse `multipart/form-data` requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the `Request.max_form_memory_size` setting. The `Request.max_content_length` setting, as well as resource limits provided by deployment software and platforms, are also available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.