Ruby是松本行弘个人开发者的一种跨平台、面向对象的动态类型编程语言。
Ruby 3.0.3之前版本存在输入验证错误漏洞,该漏洞源于在传递非常大的数据时会导致缓冲区溢出字符串(>700 MB)到CGI.escape_html。
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/
来源:MISC
链接:https://hackerone.com/reports/1328463
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/
来源:CONFIRM
链接:https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/
来源:MISC
链接:https://security-tracker.debian.org/tracker/CVE-2021-41816
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20220303-0006/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/165609/Ubuntu-Security-Notice-USN-5235-1.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2022011920
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.4000
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2021-41816
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Ruby-denial-of-service-via-HTML-Files-37285
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2022020414
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-41816
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021112503