A security vulnerability that causes buffer overflow when you pass a very large string (> 700 MB) to `CGI.escape_html` on a platform where `long` type takes 4 bytes, typically, Windows. Reference: https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/
Created ruby tracking bugs for this issue: Affects: fedora-all [bug 2026754] Created ruby:2.7/ruby tracking bugs for this issue: Affects: fedora-all [bug 2026753] Created ruby:3.0/ruby tracking bugs for this issue: Affects: fedora-35 [bug 2026756] Created ruby:master/ruby tracking bugs for this issue: Affects: fedora-all [bug 2026755]
The buffer overflow present in this flaw is only exploitable under circumstances where the system long type is 4 bytes. This would be 32 bit UNIX systems or windows. Due to this, RHEL 7 and above are unaffected by this flaw. RHSCL is affected due to potentially providing software to RHEL6 systems which can be 32 bit.
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2022:6855 https://access.redhat.com/errata/RHSA-2022:6855
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2022:6856 https://access.redhat.com/errata/RHSA-2022:6856
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-41816