First published: Wed May 29 2024(Updated: )
It was discovered that the debugger in Werkzeug was not restricted to trusted hosts. A remote attacker could possibly use this issue to execute code on the host under certain circumstances.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3-werkzeug | <3.0.1-3ubuntu0.1 | 3.0.1-3ubuntu0.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/python3-werkzeug | <2.2.2-3ubuntu0.1 | 2.2.2-3ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/python3-werkzeug | <2.0.2+dfsg1-1ubuntu0.22.04.2 | 2.0.2+dfsg1-1ubuntu0.22.04.2 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/python3-werkzeug | <0.16.1+dfsg1-2ubuntu0.2 | 0.16.1+dfsg1-2ubuntu0.2 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/python-werkzeug | <0.14.1+dfsg1-1ubuntu0.2+esm1 | 0.14.1+dfsg1-1ubuntu0.2+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/python3-werkzeug | <0.14.1+dfsg1-1ubuntu0.2+esm1 | 0.14.1+dfsg1-1ubuntu0.2+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/python-werkzeug | <0.10.4+dfsg1-1ubuntu1.2+esm2 | 0.10.4+dfsg1-1ubuntu1.2+esm2 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/python3-werkzeug | <0.10.4+dfsg1-1ubuntu1.2+esm2 | 0.10.4+dfsg1-1ubuntu1.2+esm2 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6799-1 is categorized as potentially critical due to the ability of a remote attacker to execute code.
To fix USN-6799-1, update the python3-werkzeug package to the fixed versions provided by Ubuntu.
USN-6799-1 affects multiple Ubuntu versions including 16.04, 18.04, 20.04, 22.04, 23.10, and 24.04.
The USN-6799-1 vulnerability is related to the python3-werkzeug package.
There is no proper workaround for USN-6799-1; the recommended action is to apply the necessary updates.