Bug#1034804: resteasy: CVE-2020-1695
Moritz Mühlenhoff
jmm at inutil.org
Mon Apr 24 21:55:53 BST 2023
Source: resteasy
X-Debbugs-CC: team at security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for resteasy.
CVE-2020-1695[0]:
| A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final
| and all resteasy 4.x.x versions prior to 4.6.0.Final, where an
| improper input validation results in returning an illegal header that
| integrates into the server's response. This flaw may result in an
| injection, which leads to unexpected behavior when the HTTP response
| is constructed.
https://bugzilla.redhat.com/show_bug.cgi?id=1730462
https://github.com/resteasy/Resteasy/commit/acf15f2a8067f7e4cf5838342cecfa0b78a174fb
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2020-1695
https://www.cve.org/CVERecord?id=CVE-2020-1695
Please adjust the affected versions in the BTS as needed.
More information about the pkg-java-maintainers
mailing list