UBUNTU-CVE-2019-16254

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2019-16254
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-16254.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2019-16254
Related
Published
2019-11-20T00:00:00Z
Modified
2019-11-20T00:00:00Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.

References

Affected packages

Ubuntu:Pro:14.04:LTS / jruby

Package

Name
jruby
Purl
pkg:deb/ubuntu/jruby@1.5.6-9+deb8u2build0.14.04.1~esm2?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.6-9+deb8u2build0.14.04.1~esm2

Affected versions

1.*

1.5.6-5ubuntu1
1.5.6-6
1.5.6-7

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "jruby": "1.5.6-9+deb8u2build0.14.04.1~esm2"
        }
    ]
}

Ubuntu:16.04:LTS / ruby2.3

Package

Name
ruby2.3
Purl
pkg:deb/ubuntu/ruby2.3@2.3.1-2~ubuntu16.04.14?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.1-2~ubuntu16.04.14

Affected versions

2.*

2.3.0-1
2.3.0-2
2.3.0-4ubuntu2
2.3.0-4ubuntu3
2.3.0-5ubuntu1
2.3.1-2~16.04
2.3.1-2~16.04.2
2.3.1-2~16.04.4
2.3.1-2~16.04.5
2.3.1-2~16.04.6
2.3.1-2~16.04.7
2.3.1-2~16.04.9
2.3.1-2~16.04.10
2.3.1-2~16.04.11
2.3.1-2~16.04.12
2.3.1-2~ubuntu16.04.13

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "libruby2.3-dbgsym": "2.3.1-2~ubuntu16.04.14",
            "ruby2.3-tcltk": "2.3.1-2~ubuntu16.04.14",
            "ruby2.3-dev-dbgsym": "2.3.1-2~ubuntu16.04.14",
            "libruby2.3-dbg": "2.3.1-2~ubuntu16.04.14",
            "ruby2.3-dev": "2.3.1-2~ubuntu16.04.14",
            "ruby2.3-dbgsym": "2.3.1-2~ubuntu16.04.14",
            "libruby2.3": "2.3.1-2~ubuntu16.04.14",
            "ruby2.3-tcltk-dbgsym": "2.3.1-2~ubuntu16.04.14",
            "ruby2.3": "2.3.1-2~ubuntu16.04.14",
            "ruby2.3-doc": "2.3.1-2~ubuntu16.04.14"
        }
    ]
}

Ubuntu:18.04:LTS / ruby2.5

Package

Name
ruby2.5
Purl
pkg:deb/ubuntu/ruby2.5@2.5.1-1ubuntu1.6?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.1-1ubuntu1.6

Affected versions

2.*

2.5.0~preview1-1ubuntu2
2.5.0-4ubuntu1
2.5.0-4ubuntu4
2.5.0-5ubuntu1
2.5.0-6ubuntu1
2.5.1-1ubuntu1
2.5.1-1ubuntu1.1
2.5.1-1ubuntu1.2
2.5.1-1ubuntu1.4
2.5.1-1ubuntu1.5

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "ruby2.5": "2.5.1-1ubuntu1.6",
            "ruby2.5-dbgsym": "2.5.1-1ubuntu1.6",
            "libruby2.5": "2.5.1-1ubuntu1.6",
            "libruby2.5-dbgsym": "2.5.1-1ubuntu1.6",
            "ruby2.5-dev": "2.5.1-1ubuntu1.6",
            "ruby2.5-doc": "2.5.1-1ubuntu1.6"
        }
    ]
}