gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.
{ "ubuntu_priority": "low", "availability": "No subscription required", "binaries": [ { "binary_name": "gunicorn", "binary_version": "19.4.5-1ubuntu1.1" }, { "binary_name": "gunicorn-examples", "binary_version": "19.4.5-1ubuntu1.1" }, { "binary_name": "gunicorn3", "binary_version": "19.4.5-1ubuntu1.1" }, { "binary_name": "python-gunicorn", "binary_version": "19.4.5-1ubuntu1.1" }, { "binary_name": "python3-gunicorn", "binary_version": "19.4.5-1ubuntu1.1" } ] }