Your message dated Sat, 13 Aug 2016 15:57:44 +0200
with message-id 
<CAOO6c=wej3puei-khtbuofofo_jbcgbt4quuj9t1wszsmxx...@mail.gmail.com>
and subject line 
has caused the Debian Bug report #824948,
regarding Memory exaustion vulnerability in built-in web server
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
824948: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824948
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: python3-werkzeug
Version: 0.11.9+dfsg1-1
Severity: normal

Hello,

thank you for maintaining werkzeug.

I have reported this upstream (https://github.com/pallets/werkzeug/issues/936)
and I think it's worth having also here: the built-in web server of
werkzeug has a remotely exploitable DoS vulnerability. Since it is only
intended to be used for development, fixing it is not a high priority.

Hopefully there is no code in Debian that exposes a Werkzeug built-in
server to the internet by default:

        $ apt-cache rdepends python-werkzeug
        python-werkzeug
        Reverse Depends:
          python-werkzeug-doc
          python-django-extensions
          tilestache
          tilelite
          python-werkzeug-doc
          python-httpbin
          python-pytest-localserver
          python-moinmoin
          klaus
          python-flask
          python-flaskext.wtf
          python-aodh
          python-designate
          chaussette
          python-ceilometer
        $ apt-cache rdepends python3-werkzeug
        python3-werkzeug
        Reverse Depends:
          python3-httpbin
          python3-pytest-localserver
          python3-flask
          python3-flaskext.wtf


Enrico


-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.5.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages python3-werkzeug depends on:
ii  libjs-jquery  1.12.3-1
pn  python3:any   <none>

Versions of packages python3-werkzeug recommends:
ii  python3            3.5.1-3
ii  python3-openssl    16.0.0-1
ii  python3-pyinotify  0.9.5-1

Versions of packages python3-werkzeug suggests:
ii  ipython3               2.4.1-1
pn  python-werkzeug-doc    <none>
ii  python3-lxml           3.6.0-1
ii  python3-pkg-resources  20.10.1-1

-- no debconf information

--- End Message ---
--- Begin Message ---
>From upstream:
The Werkzeug server is already vulnerable to every imaginable kind of DoS.
That's not on purpose, but it keeps the code simple, so I guess it is at
least known by the author.

I'm going to close this. There is plenty more that is wrong with that
server. It's for development purposes only.

-- 
Best regards
 Ondřej Nový

--- End Message ---
_______________________________________________
Python-modules-team mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/python-modules-team

Reply via email to