On Tue, 01 Sep 2020 10:51:48 +0200 Salvatore Bonaccorso <car...@debian.org> wrote: > The following vulnerability was published for python-flask-cors. > > CVE-2020-25032[0]: > | An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) > | before 3.0.9. It allows ../ directory traversal to access private > | resources because resource matching does not ensure that pathnames are > | in a canonical format. > > > If you fix the vulnerability please also make sure to include the > CVE (Common Vulnerabilities & Exposures) id in your changelog entry. > > For further information see: > > [0] https://security-tracker.debian.org/tracker/CVE-2020-25032 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25032 > [1] > https://github.com/corydolphin/flask-cors/commit/67c4b2cc98ae87cf1fa7df4f97fd81b40c79b895
I have prepared a buster-security release at https://salsa.debian.org/python-team/packages/python-flask-cors/-/tags/debian%2F3.0.7-2 The new upstream release is waiting in the master branch to be published in sid.