CVE-2018-1000656

NameCVE-2018-1000656
DescriptionThe Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. NOTE: this may overlap CVE-2019-1010083.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1892-1, ELA-940-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
flask (PTS)jessie, jessie (lts)0.10.1-2+deb8u1fixed
stretch (lts), stretch0.12.1-1+deb9u1fixed
buster (security), buster, buster (lts)1.0.2-3+deb10u1fixed
bullseye (security), bullseye1.1.2-2+deb11u1fixed
bookworm2.2.2-3fixed
sid, trixie3.1.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
flasksourcewheezy(unfixed)end-of-life
flasksourcejessie0.10.1-2+deb8u1DLA-1892-1
flasksourcestretch0.12.1-1+deb9u1ELA-940-1
flasksource(unstable)1.0.2-1

Notes

[stretch] - flask <no-dsa> (Minor issue)
https://github.com/pallets/flask/pull/2691
https://github.com/pallets/flask/commit/b178e89e4456e777b1a7ac6d7199052d0dfdbbbe (1.0)
https://github.com/pallets/flask/commit/b178e89e4456e777b1a7ac6d7199052d0dfdbbbe (0.12.3)

Search for package or bug name: Reporting problems