diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2021-12-01 07:52:35 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2021-12-01 07:52:35 +0100 |
commit | 4df7dbc9f4738eea8b4d58471ad1ce21ba0091bd (patch) | |
tree | a50f887ede2c97a582fb3cd74486fc4b89180f58 | |
parent | 467a76f20e40fec8ac5e0b83b342fc4758bc123b (diff) |
Add CVE-2021-41819/ruby
-rw-r--r-- | data/CVE/list.2021 | 9 |
1 files changed, 8 insertions, 1 deletions
diff --git a/data/CVE/list.2021 b/data/CVE/list.2021 index 6a5ce323a2..fe4f277c2b 100644 --- a/data/CVE/list.2021 +++ b/data/CVE/list.2021 @@ -6127,8 +6127,15 @@ CVE-2021-41821 (Wazuh Manager in Wazuh through 4.1.5 is affected by a remote Int NOT-FOR-US: Wazuh CVE-2021-41820 RESERVED -CVE-2021-41819 +CVE-2021-41819 [Cookie Prefix Spoofing in CGI::Cookie.parse] RESERVED + - ruby3.0 <unfixed> + - ruby2.7 <unfixed> + - ruby2.5 <removed> + - ruby2.3 <removed> + NOTE: Fixed in Ruby 3.0.3, 2.7.5, 2.6.9 + NOTE: https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/ + TODO: check upstream commits CVE-2021-41818 RESERVED CVE-2021-41817 [Regular Expression Denial of Service Vulnerability of Date Parsing Methods] |