Source: starlette
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for starlette.

CVE-2024-47874[0]:
| Starlette is an Asynchronous Server Gateway Interface (ASGI)
| framework/toolkit. Prior to version 0.40.0, Starlette treats
| `multipart/form-data` parts without a `filename` as text form fields
| and buffers those in byte strings with no size limit. This allows an
| attacker to upload arbitrary large form fields and cause Starlette
| to both slow down significantly due to excessive memory allocations
| and copy operations, and also consume more and more memory until the
| server starts swapping and grinds to a halt, or the OS terminates
| the server process with an OOM error. Uploading multiple such
| requests in parallel may be enough to render a service practically
| unusable, even if reasonable request size limits are enforced by a
| reverse proxy in front of Starlette. This Denial of service (DoS)
| vulnerability affects all applications built with Starlette (or
| FastAPI) accepting form requests. Verison 0.40.0 fixes this issue.

https://github.com/encode/starlette/security/advisories/GHSA-f96h-pmfr-66vw
https://github.com/encode/starlette/commit/fd038f3070c302bff17ef7d173dbb0b007617733
 (0.40.0)


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-47874
    https://www.cve.org/CVERecord?id=CVE-2024-47874

Please adjust the affected versions in the BTS as needed.

Reply via email to