First published: Mon Jun 01 2020(Updated: )
It was discovered that Flask incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python-flask | <0.12.2-3ubuntu0.1 | 0.12.2-3ubuntu0.1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/python3-flask | <0.12.2-3ubuntu0.1 | 0.12.2-3ubuntu0.1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/python-flask | <0.10.1-2ubuntu0.1 | 0.10.1-2ubuntu0.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/python3-flask | <0.10.1-2ubuntu0.1 | 0.10.1-2ubuntu0.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/python-flask | <0.10.1-2ubuntu0.1~esm1 | 0.10.1-2ubuntu0.1~esm1 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/python3-flask | <0.10.1-2ubuntu0.1~esm1 | 0.10.1-2ubuntu0.1~esm1 |
Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Flask vulnerability is USN-4378-1.
This Flask vulnerability could be exploited by an attacker to cause a denial of service.
The versions 0.12.2-3ubuntu0.1, 0.10.1-2ubuntu0.1, and 0.10.1-2ubuntu0.1~esm1 of Python Flask are affected by this vulnerability.
To fix this Flask vulnerability, you should update your Python Flask package to version 0.12.2-3ubuntu0.1 or higher.
You can find more information about this Flask vulnerability on the Ubuntu Security website and the Launchpad pages for Flask.