CVE-2019-16254

Priority
Description
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows
HTTP Response Splitting. If a program using WEBrick inserts untrusted input
into the response header, an attacker can exploit it to insert a newline
character to split a header, and inject malicious content to deceive
clients. NOTE: this issue exists because of an incomplete fix for
CVE-2017-17742, which addressed the CRLF vector, but did not address an
isolated CR or an isolated LF.
Assigned-to
leosilva
Notes
Package
Source: jruby (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Ubuntu 19.04 (Disco Dingo):not-affected (code not present)
Ubuntu 19.10 (Eoan Ermine):not-affected (code not present)
Ubuntu 20.04 (Focal Fossa):not-affected (code not present)
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (2.3.1-2~ubuntu16.04.14)
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 (Focal Fossa):DNE
Package
Upstream:released (2.5.7-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):released (2.5.1-1ubuntu1.6)
Ubuntu 19.04 (Disco Dingo):released (2.5.5-1ubuntu1.1)
Ubuntu 19.10 (Eoan Ermine):released (2.5.5-4ubuntu2.1)
Ubuntu 20.04 (Focal Fossa):not-affected
Patches:
Upstream:https://github.com/ruby/ruby/commit/3ce238b5f9795581eb84114dcfbdf4aa086bfecc (master)
Upstream:https://github.com/ruby/ruby/commit/f98b3023bd786b4e7dfdb94b573a5f5d3d37d145 (2.5.x)
More Information

Updated: 2019-12-05 21:10:03 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)