http://bugzilla.opensuse.org/show_bug.cgi?id=1106279 Bug ID: 1106279 Summary: VUL-1: CVE-2018-1000656 python-flask: Improper Input Validation via crafted JSON file Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.3 Hardware: Other URL: https://smash.suse.de/issue/213087/ OS: Other Status: NEW Severity: Minor Priority: P5 - None Component: Other Assignee: mimi.vx@gmail.com Reporter: meissner@suse.com QA Contact: security-team@suse.de CC: petr@cervinka.net Found By: Security Response Team Blocker: --- rh#1623131 The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. References: https://bugzilla.redhat.com/show_bug.cgi?id=1623131 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000656 https://github.com/pallets/flask/pull/2691 https://github.com/pallets/flask/releases/tag/0.12.3 -- You are receiving this mail because: You are on the CC list for the bug.