-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat OpenStack Platform (python-werkzeug) security update
Advisory ID:       RHSA-2023:1281-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:1281
Issue date:        2023-03-15
CVE Names:         CVE-2023-25577 
====================================================================
1. Summary:

An update for python-werkzeug is now available for Red Hat OpenStack
Platform.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 13.0 - ELS - noarch
Red Hat OpenStack Platform 16.1 - noarch
Red Hat OpenStack Platform 16.2 - noarch

3. Description:

Werkzeug started as simple collection of various
utilities for WSGI applications and has become one of the most advanced
WSGI utility modules. It includes a powerful debugger, full featured
request and response objects, HTTP utilities to handle entity tags, cache
control headers, HTTP dates, cookie handling, file uploads, a powerful URL
routing system and a bunch of community contributed addon modules. Werkzeug
is unicode aware and doesn't enforce a specific template engine, database
adapter or anything else. It doesn't even enforce a specific way of
handling requests and leaves all that up to the developer. It's most useful
for end user applications which should work on as many server environments
as possible (such as blogs, wikis, bulletin boards, etc.).

Security Fix(es):

* high resource usage when parsing multipart form data with many fields
(CVE-2023-25577)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2170242 - CVE-2023-25577 python-werkzeug: high resource usage when parsing multipart form data with many fields

6. Package List:

Red Hat OpenStack Platform 13.0 - ELS:

Source:
python-werkzeug-0.14.1-3.1.el7ost.src.rpm

noarch:
python2-werkzeug-0.14.1-3.1.el7ost.noarch.rpm
python2-werkzeug-doc-0.14.1-3.1.el7ost.noarch.rpm

Red Hat OpenStack Platform 16.1:

Source:
python-werkzeug-0.14.1-12.el8ost.src.rpm

noarch:
python3-werkzeug-0.14.1-12.el8ost.noarch.rpm

Red Hat OpenStack Platform 16.2:

Source:
python-werkzeug-0.14.1-12.el8ost.src.rpm

noarch:
python3-werkzeug-0.14.1-12.el8ost.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2023-25577
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBZBI1RNzjgjWX9erEAQhLXw/+MQcQuYA0x8PpAFZEYPAiR2eNanNh+p8H
YDcu0RNAcz0XkcBYegR3K0Lqbt2a8F/+orH4lQ5Bx6jmaFEchPgo7jTc13XnI+FW
4IMrRiYoW8I/OyOfBgn617Q4qhqi3K3VxvQIfzxif9b1wQJUztIvzWJcEpZ7hVZp
Gm/6fSq2ibi1nUoIHZtPxlCsShlcK5nMzM4Y0Z54dDC8i3W7vu5C7o+qOj4aGF9t
LhZjUQt/4I3ga1wITO22t3aDBiI3YENng5FUO72gpAYXGiMjjahe3CYaMkBLEGaD
8mwZAtndqRK5jpHnrA9r0zCGLLZNgHN/1P09iIgjyOvZwxihpBKXzPBGaREZ9ZmP
PKyq5v/7rr2fEcqGR+QwePAaIff3RD5x8kk+opohsCT6iNTqkU2bUlqAu3fG6w8y
d/qJk0MoU3+/JS5gH/ra+PVxDVj3FleSxYhlFqhRBi1EXMWlkrq67piHcjRfhYa7
pFhjaAflormx0KV4xxpN3r5l0exfdqNbpByhN6A76BEFUHIjRywUc1vtSvHNuYAh
nF/Y8RHTfk/A2Ik/U0XD0h1p3c10W7Nb6cBi89XSSWzoYeI7HDUa2UHhtVJGmsoW
0M5xyq3d7FsO4wX3P4AfpnaWVa+UTxURjUI5JKpV2rj2MJuUwXAjdNazipt1cTNN
u3V3o4Cxz1I=Oici
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-1281:01 Important: Red Hat OpenStack Platform

An update for python-werkzeug is now available for Red Hat OpenStack Platform

Summary

Werkzeug started as simple collection of various utilities for WSGI applications and has become one of the most advanced WSGI utility modules. It includes a powerful debugger, full featured request and response objects, HTTP utilities to handle entity tags, cache control headers, HTTP dates, cookie handling, file uploads, a powerful URL routing system and a bunch of community contributed addon modules. Werkzeug is unicode aware and doesn't enforce a specific template engine, database adapter or anything else. It doesn't even enforce a specific way of handling requests and leaves all that up to the developer. It's most useful for end user applications which should work on as many server environments as possible (such as blogs, wikis, bulletin boards, etc.).
Security Fix(es):
* high resource usage when parsing multipart form data with many fields (CVE-2023-25577)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2023-25577 https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat OpenStack Platform 13.0 - ELS:
Source: python-werkzeug-0.14.1-3.1.el7ost.src.rpm
noarch: python2-werkzeug-0.14.1-3.1.el7ost.noarch.rpm python2-werkzeug-doc-0.14.1-3.1.el7ost.noarch.rpm
Red Hat OpenStack Platform 16.1:
Source: python-werkzeug-0.14.1-12.el8ost.src.rpm
noarch: python3-werkzeug-0.14.1-12.el8ost.noarch.rpm
Red Hat OpenStack Platform 16.2:
Source: python-werkzeug-0.14.1-12.el8ost.src.rpm
noarch: python3-werkzeug-0.14.1-12.el8ost.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2023:1281-01
Product: Red Hat OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2023:1281
Issued Date: : 2023-03-15
CVE Names: CVE-2023-25577

Topic

An update for python-werkzeug is now available for Red Hat OpenStackPlatform.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat OpenStack Platform 13.0 - ELS - noarch

Red Hat OpenStack Platform 16.1 - noarch

Red Hat OpenStack Platform 16.2 - noarch


Bugs Fixed

2170242 - CVE-2023-25577 python-werkzeug: high resource usage when parsing multipart form data with many fields


Related News