what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-1018-01

Red Hat Security Advisory 2023-1018-01
Posted Mar 1, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-1018-01 - An update for python-werkzeug is now available for Red Hat OpenStack Platform 17.0 (Wallaby). Issues addressed include a remote shell upload vulnerability.

tags | advisory, remote, shell, python
systems | linux, redhat
advisories | CVE-2023-25577
SHA-256 | 6cabeb616cc86e2cbaf9eeff580fc77e5c814243da7ceecee78741afbe444047

Red Hat Security Advisory 2023-1018-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat OpenStack Platform 17.0 (python-werkzeug) security update
Advisory ID: RHSA-2023:1018-01
Product: Red Hat OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2023:1018
Issue date: 2023-02-28
CVE Names: CVE-2023-25577
====================================================================
1. Summary:

An update for python-werkzeug is now available for Red Hat OpenStack
Platform 17.0 (Wallaby).

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 17.0 - noarch

3. Description:

Werkzeug ======== Werkzeug started as simple collection of various
utilities for WSGI applications and has become one of the most advanced
WSGI utility modules. It includes a powerful debugger, full featured
request and response objects, HTTP utilities to handle entity tags, cache
control headers, HTTP dates, cookie handling, file uploads, a powerful URL
routing system and a bunch of community contributed addon modules. Werkzeug
is unicode aware and doesn't enforce a specific template engine, database
adapter or anything else. It doesn't even enforce a specific way of
handling requests and leaves all that up to the developer. It's most useful
for end user applications which should work on as many server environments
as possible (such as blogs, wikis, bulletin boards, etc.).

Security Fix(es):

* high resource usage when parsing multipart form data with many fields
(CVE-2023-25577)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2170242 - CVE-2023-25577 python-werkzeug: high resource usage when parsing multipart form data with many fields

6. Package List:

Red Hat OpenStack Platform 17.0:

Source:
python-werkzeug-2.0.1-5.el9ost.src.rpm

noarch:
python3-werkzeug-2.0.1-5.el9ost.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2023-25577
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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XRFX
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close