First published: Thu Nov 25 2021(Updated: )
A security vulnerability that causes buffer overflow when you pass a very large string (> 700 MB) to `CGI.escape_html` on a platform where `long` type takes 4 bytes, typically, Windows. Reference: <a href="https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/">https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2026752 is high due to its potential to cause buffer overflow issues.
To fix REDHAT-BUG-2026752, it is recommended to apply the latest security patches provided by the Ruby maintainers.
REDHAT-BUG-2026752 affects Ruby environments where the `CGI.escape_html` method is used and the platform's `long` type is 4 bytes.
No, REDHAT-BUG-2026752 is not classified as a remote execution vulnerability but rather a buffer overflow issue.
REDHAT-BUG-2026752 primarily impacts Windows environments due to the 4-byte long type behavior.