Carlos Henrique Lima Melara pushed to branch master at Debian Security Tracker / security-tracker
Commits: a2ff435f by Carlos Henrique Lima Melara at 2026-02-24T22:07:30-03:00 CVE-2026-27205/flask: mark bullseye as postponed Three conditions are required to trigger the CVE (per upstream [1]): 1. The application must be hosted behind a caching proxy that does not ignore responses with cookies. 2. The application does not set a Cache-Control header to indicate that a page is private or should not be cached. 3. The application accesses the session in a way that does not access the values, only the keys, and does not mutate the session. Therefore it highly depend on the use case and generelly it's hard to trigger. [1] https://github.com/pallets/flask/security/advisories/GHSA-68rp-wp8r-4726 - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1211,6 +1211,7 @@ CVE-2026-27205 (Flask is a web server gateway interface (WSGI) web application f - flask <unfixed> (bug #1128620) [trixie] - flask <no-dsa> (Minor issue) [bookworm] - flask <no-dsa> (Minor issue) + [bullseye] - flask <postponed> (Minor issue, hard to trigger) NOTE: https://github.com/pallets/flask/security/advisories/GHSA-68rp-wp8r-4726 NOTE: Fixed by: https://github.com/pallets/flask/commit/089cb86dd22bff589a4eafb7ab8e42dc357623b4 (3.1.3) CVE-2026-27203 (eBay API MCP Server is an open source local MCP server providing AI as ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a2ff435fef7458a97c5f6ff2bf537139c3b25f0e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a2ff435fef7458a97c5f6ff2bf537139c3b25f0e You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
