{"id":"MGASA-2021-0039","summary":"Updated resteasy packages fix a security vulnerability","details":"A flaw was found in Resteasy, where an improper input validation results in\nreturning an illegal header that integrates into the server's response. This\nflaw may result in an injection, which leads to unexpected behavior when the\nHTTP response is constructed (CVE-2020-1695).\n","modified":"2026-04-16T00:09:42.513620038Z","published":"2021-01-17T16:07:01Z","upstream":["CVE-2020-1695"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0039.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=27794"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/IJDMT443YZWCBS5NS76XZ7TL3GK7BXHL/"}],"affected":[{"package":{"name":"resteasy","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/resteasy?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.26-2.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0039.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}