[Git][security-tracker-team/security-tracker][master] Reference upstream commits for CVE-2021-41819/ruby*

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Dec 2 21:28:19 GMT 2021



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
929e6a41 by Salvatore Bonaccorso at 2021-12-02T22:27:32+01:00
Reference upstream commits for CVE-2021-41819/ruby*

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -9775,7 +9775,7 @@ CVE-2021-41819 [Cookie Prefix Spoofing in CGI::Cookie.parse]
 	- ruby2.3 <removed>
 	NOTE: Fixed in Ruby 3.0.3, 2.7.5, 2.6.9
 	NOTE: https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/
-	TODO: check upstream commits
+	NOTE: Fixed by: https://github.com/ruby/cgi/commit/052eb3a828b0f99bca39cfd800f6c2b91307dbd5 (v0.3.1)
 CVE-2021-41818
 	RESERVED
 CVE-2021-41817 [Regular Expression Denial of Service Vulnerability of Date Parsing Methods]



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/929e6a412ca50913837ece6e0013743387c418ae

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/929e6a412ca50913837ece6e0013743387c418ae
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211202/0a4a3147/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list