—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-4186-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
April 28, 2018 https://www.debian.org/security/faq
– ————————————————————————-
Package : gunicorn
CVE ID : CVE-2018-1000164
It was discovered that gunicorn, an event-based HTTP/WSGI server was
susceptible to HTTP Response splitting.
For the oldstable distribution (jessie), this problem has been fixed
in version 19.0-1+deb8u1.
We recommend that you upgrade your gunicorn packages.
For the detailed security status of gunicorn please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gunicorn
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=P2ZF
—–END PGP SIGNATURE—–