• Bug#1105794: flask: CVE-2025-47278

    From Salvatore Bonaccorso@21:1/5 to All on Wed May 14 22:40:01 2025
    Source: flask
    Version: 3.1.0-2
    Severity: important
    Tags: security upstream
    X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

    Hi,

    The following vulnerability was published for flask.

    CVE-2025-47278[0]:
    | Flask is a web server gateway interface (WSGI) web application
    | framework. In Flask 3.1.0, the way fallback key configuration was
    | handled resulted in the last fallback key being used for signing,
    | rather than the current signing key. Signing is provided by the
    | `itsdangerous` library. A list of keys can be passed, and it expects
    | the last (top) key in the list to be the most recent key, and uses
    | that for signing. Flask was incorrectly constructing that list in
    | reverse, passing the signing key first. Sites that have opted-in to
    | use key rotation by setting `SECRET_KEY_FALLBACKS` care likely to
    | unexpectedly be signing their sessions with stale keys, and their
    | transition to fresher keys will be impeded. Sessions are still
    | signed, so this would not cause any sort of data integrity loss.
    | Version 3.1.1 contains a patch for the issue.


    If you fix the vulnerability please also make sure to include the
    CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

    For further information see:

    [0] https://security-tracker.debian.org/tracker/CVE-2025-47278
    https://www.cve.org/CVERecord?id=CVE-2025-47278
    [1] https://github.com/pallets/flask/security/advisories/GHSA-4grg-w6v8-c28g [2] https://github.com/pallets/flask/commit/73d6504063bfa00666a92b07a28aaf906c532f09

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)