From 680988aac4e181c028a23b66c33d315a3a23525a Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Thu, 2 Dec 2021 22:27:32 +0100 Subject: Reference upstream commits for CVE-2021-41819/ruby* --- data/CVE/2021.list | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/data/CVE/2021.list b/data/CVE/2021.list index 774124ab7f..bfebd81545 100644 --- a/data/CVE/2021.list +++ b/data/CVE/2021.list @@ -6283,7 +6283,7 @@ CVE-2021-41819 [Cookie Prefix Spoofing in CGI::Cookie.parse] - ruby2.3 NOTE: Fixed in Ruby 3.0.3, 2.7.5, 2.6.9 NOTE: https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/ - TODO: check upstream commits + NOTE: Fixed by: https://github.com/ruby/cgi/commit/052eb3a828b0f99bca39cfd800f6c2b91307dbd5 (v0.3.1) CVE-2021-41818 RESERVED CVE-2021-41817 [Regular Expression Denial of Service Vulnerability of Date Parsing Methods] -- cgit v1.2.3