gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "19.4.5-1ubuntu1.1", "binary_name": "gunicorn" }, { "binary_version": "19.4.5-1ubuntu1.1", "binary_name": "gunicorn-examples" }, { "binary_version": "19.4.5-1ubuntu1.1", "binary_name": "gunicorn3" }, { "binary_version": "19.4.5-1ubuntu1.1", "binary_name": "python-gunicorn" }, { "binary_version": "19.4.5-1ubuntu1.1", "binary_name": "python3-gunicorn" } ] }