gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.
{
"binaries": [
{
"binary_name": "gunicorn",
"binary_version": "19.4.5-1ubuntu1.1"
},
{
"binary_name": "gunicorn-examples",
"binary_version": "19.4.5-1ubuntu1.1"
},
{
"binary_name": "gunicorn3",
"binary_version": "19.4.5-1ubuntu1.1"
},
{
"binary_name": "python-gunicorn",
"binary_version": "19.4.5-1ubuntu1.1"
},
{
"binary_name": "python3-gunicorn",
"binary_version": "19.4.5-1ubuntu1.1"
}
],
"availability": "No subscription required"
}