Back to bug 2170242

Who When What Removed Added
Anten Skrabec 2023-02-16 00:10:37 UTC Blocks 2169911
Anten Skrabec 2023-02-16 00:11:40 UTC CC apevec, bcl, bdettelb, eglynn, gtanzill, jjoyce, lhh, mburns, mgarciac, mminar, njohnston, nobody, rbiba, rhos-maint, scohen, spower, sskracic
Anten Skrabec 2023-02-16 00:12:45 UTC Severity medium high
Priority medium high
Anten Skrabec 2023-02-16 00:20:13 UTC Depends On 2170250, 2170262, 2170261, 2170246, 2170266, 2170244, 2170264, 2170248, 2170259, 2170253, 2170256, 2170255
Anten Skrabec 2023-02-16 00:26:41 UTC Depends On 2170275, 2170272, 2170273, 2170274
TEJ RATHI 2023-02-16 06:54:01 UTC CC dfreiber, jburrell, rogbas, vkumar
TEJ RATHI 2023-02-16 06:54:40 UTC Depends On 2170319, 2170324, 2170320, 2170325, 2170323, 2170322, 2170321
Paige Jung 2023-02-16 17:40:20 UTC Doc Text Werkzeug's multipart form data parser will parse an unlimited number of parts, including file parts. Parts can be a small amount of bytes, but each requires CPU time to parse and may use more memory as Python data. If a request can be made to an endpoint that accesses request.data, request.form, request.files, or request.get_data(parse_form_data=False), it can cause unexpectedly high resource usage.

This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. The amount of RAM required can trigger an out of memory kill of the process. Unlimited file parts can use up memory and file handles. If many concurrent requests are sent continuously, this can exhaust or kill all available workers.
A flaw was found in python-werkzeug. Werkzeug is multipart form data parser, that will parse an unlimited number of parts, including file parts. These parts can be a small amount of bytes, but each requires CPU time to parse, and may use more memory as Python data. If a request can be made to an endpoint that accesses request.data, request.form, request.files, or request.get_data(parse_form_data=False), it can cause unexpectedly high resource usage, allowing an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests, and if many concurrent requests are sent continuously, this can exhaust or kill all available workers.
Brian Lane 2023-02-16 21:42:54 UTC Doc Type --- If docs needed, set a value
Flags needinfo?(askrabec)
Anten Skrabec 2023-02-21 00:39:38 UTC Flags needinfo?(askrabec)
Anten Skrabec 2023-02-21 19:05:39 UTC Depends On 2172263
Anten Skrabec 2023-02-27 19:59:38 UTC Depends On 2173736
errata-xmlrpc 2023-02-28 15:47:31 UTC Link ID Red Hat Product Errata RHSA-2023:1018
Sandro Mani 2023-03-07 08:42:02 UTC CC manisandro
errata-xmlrpc 2023-03-15 19:56:35 UTC Link ID Red Hat Product Errata RHSA-2023:1281
Product Security DevOps Team 2023-03-15 23:58:29 UTC Resolution --- ERRATA
Status NEW CLOSED
Last Closed 2023-03-15 23:58:29 UTC
Brian Lane 2023-04-20 18:50:12 UTC Depends On 2188442
Brian Lane 2023-04-21 18:19:07 UTC Flags needinfo?(trathi)
CC trathi
TEJ RATHI 2023-04-25 04:50:50 UTC Flags needinfo?(trathi)
errata-xmlrpc 2023-05-17 22:53:50 UTC Link ID Red Hat Product Errata RHSA-2023:1325

Back to bug 2170242