-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3184
               [SECURITY] [DLA 1892-1] flask security update
                              21 August 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           flask
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-1000656  

Reference:         ESB-2019.0912

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2019/08/msg00025.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : flask
Version        : 0.10.1-2+deb8u1
CVE ID         : CVE-2018-1000656


Flask, a micro web framework for Python contains a CWE-20: Improper
Input Validation vulnerability that can result in Large amount of
memory usage possibly leading to denial of service. This attack appear
to be exploitable via Attacker provides JSON data in incorrect encoding.

For Debian 8 "Jessie", this problem has been fixed in version
0.10.1-2+deb8u1.

We recommend that you upgrade your flask packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE7xPqJqaY/zX9fJAuhj1N8u2cKO8FAl1bxYAACgkQhj1N8u2c
KO9Y1A//c6/muMnYuDm8sH291LC9m+4UQo9q7ecyCWtNvLzlvvn0JI5+YB7Kpnv3
wHVsLx2vcQxdALdSIHCvtAG3PChHlW9AtF1qz3BzTYrto++y13WXUqKoypg/1TrA
ZdAm9sW46W80PuF/Izx0lH19v7yasiZyKPH3JxVqWRAtuyBprihLnghvLME+sfoh
svRvEbpzxhkOYbrBWa4MZuL6waZadB0mdUydHN7H+lkAQcClEY375bhaXyL1BXrc
1NR/yzPk5carD2vVJUKv7vOIgPAli4OiVHK+htmify1sgTRvo9JcnkIh2xrggWDj
mbZt5sKiXEGcvZThJIfiLUV41QDfulN6AwzDPv+VWkOW8rw1/B7Xk1ASZURDBSV6
sFuGN4rrvMPDlBJQw+NPi3t6wl6iAFpGHk6le114ggVrf7xS4yVtJmgqM444hXbE
azxjerxhju2kyrFfkX9uI52amuRFQHZcv/GGPBXhkxP5iAUINgmTjl0V95niQCQ2
bhGbOavBTiHMvnJM3aJEmvMe3nLVLV8vym0X5Ia/n4KGwgbEDAmF5Qrwcv3lgTx7
ToKxMeSX8WiCD0a0voC0EmwtOibI8RxQQmFRiLzflZtjE7nZ23UME+D4WGDi5ZEL
hXTzvm/wgyabZPWdNrJrfVORxCjPTJq39coZP8TQQYQrtAC7+m4=
=/Uwm
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=GpoH
-----END PGP SIGNATURE-----