First published: Wed Nov 24 2021(Updated: )
A buffer overrun vulnerability was discovered in CGI.escape_html. This can lead to a buffer overflow when a user passes a very large string (> 700 MB) to CGI.escape_html on a platform where long type takes 4 bytes, typically, Windows.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-ruby30-ruby | <0:3.0.4-149.el7 | 0:3.0.4-149.el7 |
redhat/rh-ruby27-ruby | <0:2.7.6-131.el7 | 0:2.7.6-131.el7 |
Ruby-lang Cgi | <0.3.1 | |
Ruby-lang Cgi | <=0.2.0 | |
Ruby-lang Ruby | >=3.0.0<3.0.3 | |
Ruby-lang Cgi | <=0.1.0 | |
Ruby-lang Ruby | >=2.7.0<2.7.5 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
All of | ||
Ruby-lang Ruby | >=3.0.0<3.0.3 | |
Ruby-lang Cgi | <=0.2.0 | |
All of | ||
Ruby-lang Ruby | >=2.7.0<2.7.5 | |
Ruby-lang Cgi | <=0.1.0 | |
rubygems/cgi | <0.1.0.1 | 0.1.0.1 |
rubygems/cgi | >=0.2.0<0.2.1 | 0.2.1 |
rubygems/cgi | >=0.3.0<0.3.1 | 0.3.1 |
debian/ruby2.7 | 2.7.4-1+deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41816 is a buffer overrun vulnerability in CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3.
CVE-2021-41816 has a severity rating of 9.8, which is considered critical.
CGI.escape_html in Ruby versions before 2.7.5 and 3.x before 3.0.3 are affected.
To fix CVE-2021-41816, upgrade to Ruby version 2.7.5 or 3.0.3, or apply the appropriate remedy provided by the software vendor.
You can find more information about CVE-2021-41816 in the references section of the vulnerability report.