[Git][security-tracker-team/security-tracker][master] Reference upstream commits for CVE-2021-41819/ruby*
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Dec 2 21:28:19 GMT 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
929e6a41 by Salvatore Bonaccorso at 2021-12-02T22:27:32+01:00
Reference upstream commits for CVE-2021-41819/ruby*
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -9775,7 +9775,7 @@ CVE-2021-41819 [Cookie Prefix Spoofing in CGI::Cookie.parse]
- ruby2.3 <removed>
NOTE: Fixed in Ruby 3.0.3, 2.7.5, 2.6.9
NOTE: https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/
- TODO: check upstream commits
+ NOTE: Fixed by: https://github.com/ruby/cgi/commit/052eb3a828b0f99bca39cfd800f6c2b91307dbd5 (v0.3.1)
CVE-2021-41818
RESERVED
CVE-2021-41817 [Regular Expression Denial of Service Vulnerability of Date Parsing Methods]
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/929e6a412ca50913837ece6e0013743387c418ae
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/929e6a412ca50913837ece6e0013743387c418ae
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211202/0a4a3147/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list