CVE-2019-16869
Published: 26 September 2019
Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling.
From the Ubuntu security team
It was discovered that Netty has HTTP request smuggling vulnerability. A remote attacker could use it to extract sensitive information.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
netty Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(1:4.1.33-3)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(1:4.1.33-3)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Needed
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needed
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Needed
|
|
netty-3.9 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(3.9.9.Final-1+deb9u1build0.18.04.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(3.9.0.Final-1ubuntu0.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16869
- https://github.com/netty/netty/compare/netty-4.1.41.Final...netty-4.1.42.Final
- https://github.com/netty/netty/issues/9571
- https://github.com/netty/netty/commit/39cafcb05c99f2aa9fce7e6597664c9ed6a63a95
- https://usn.ubuntu.com/usn/usn-4532-1
- https://usn.ubuntu.com/usn/usn-4600-1
- NVD
- Launchpad
- Debian