Description
CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem before 0.3.1 for Ruby.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5067-1 | ruby2.7 security update |
Github GHSA |
GHSA-5cqm-crxm-6qpv | Buffer overrun in CGI.escape_html |
Ubuntu USN |
USN-5235-1 | Ruby vulnerabilities |
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T03:22:24.883Z
Reserved: 2021-09-29T00:00:00.000Z
Link: CVE-2021-41816
No data.
Status : Modified
Published: 2022-02-06T21:15:07.887
Modified: 2024-11-21T06:26:48.520
Link: CVE-2021-41816
OpenCVE Enrichment
No data.
Debian DSA
Github GHSA
Ubuntu USN