UBUNTU-CVE-2019-5419

Source
https://ubuntu.com/security/CVE-2019-5419
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-5419.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2019-5419
Upstream
Published
2019-03-27T14:29:00Z
Modified
2025-07-18T16:44:58Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive.

References

Affected packages

Ubuntu:Pro:16.04:LTS / rails

Package

Name
rails
Purl
pkg:deb/ubuntu/rails@2:4.2.6-1ubuntu0.1~esm2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:4.*

2:4.1.10-1
2:4.2.5-1
2:4.2.5.1-1
2:4.2.5.2-2
2:4.2.6-1
2:4.2.6-1ubuntu0.1~esm1
2:4.2.6-1ubuntu0.1~esm2

Ubuntu:Pro:18.04:LTS / rails

Package

Name
rails
Purl
pkg:deb/ubuntu/rails@2:4.2.10-0ubuntu4+esm2?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:4.*

2:4.2.9-2
2:4.2.9-4
2:4.2.10-0ubuntu4
2:4.2.10-0ubuntu4+esm1
2:4.2.10-0ubuntu4+esm2