Name | CVE-2019-1010083 |
Description | The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact is: denial of service. The attack vector is: crafted encoded JSON data. The fixed version is: 1. NOTE: this may overlap CVE-2018-1000656. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
flask (PTS) | bullseye (security), bullseye | 1.1.2-2+deb11u1 | fixed |
| bookworm | 2.2.2-3 | fixed |
| sid, trixie | 3.1.0-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
flask | source | (unstable) | 1.0.2-1 | | | |
Notes
[stretch] - flask <no-dsa> (Minor issue)
[jessie] - flask <ignored> (Minor issue, considered fixed with CVE-2018-1000656 TTBOOK)
https://www.palletsprojects.com/blog/flask-1-0-released/
https://github.com/pallets/flask/pull/2691/commits/ab4142215d836b0298fc47fa1e4b75408b9c37a0 (1.0)
After communication with MITRE, this CVE *might* overlap CVE-2018-1000656.
CVE-2019-1010083 was back then assigned by the DWF CNA, but the exact scope
of the CVE is unclear and might for instance be for an incomplete fix of
CVE-2018-1000656. As such it was only noted with a "may overlap". The
CVE-2019-1010083 only refers to the 1.0 release announcement and it is
guaranteed that it relates as well to pull request 2691. Upstream itself did
not comment on direct pings/questions back.