Skip to content

Use cve.org instead of nist.gov #3049

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Apr 27, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,6 @@ um CVE-2011-3389 durchlesen.


[1]: http://www.openssl.org/~bodo/tls-cbc.txt
[2]: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389
[2]: https://www.cve.org/CVERecord?id=CVE-2011-3389
[3]: https://bugs.ruby-lang.org/5353
[4]: http://mla.n-z.jp/?ruby-talk=393484
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ In der OpenSSL-Implementation der Heartbeat-Erweiterung (`RFC6520`) von TLS/DTLS
(Protokolle zum Verschlüsseln der Transportschicht) wurde eine
kritische Sicherheitslücke entdeckt. Es handelt sich hierbei um ein
schwerwiegendes Sicherheitsproblem, dem die CVE-Kennung
[CVE-2014-0160](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160)
[CVE-2014-0160](https://www.cve.org/CVERecord?id=CVE-2014-0160)
zugewiesen wurde.

Seine Ausnutzung kann das Auslesen des Serverspeichers durch den
Expand Down
2 changes: 1 addition & 1 deletion de/news/_posts/2014-08-19-ruby-1-9-2-p330-released.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,4 +54,4 @@ Wir ermutigen Sie dazu, auf eine stabile und unterstützte
[Version von Ruby](https://www.ruby-lang.org/de/downloads/)
zu aktualisieren.

[CVE-2014-6438]: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6438
[CVE-2014-6438]: https://www.cve.org/CVERecord?id=CVE-2014-6438
Original file line number Diff line number Diff line change
Expand Up @@ -18,8 +18,8 @@ wurde.

Es wurden die folgenden Schwachstellen gemeldet:

* [CVE-2012-6708](https://nvd.nist.gov/vuln/detail/CVE-2012-6708)
* [CVE-2015-9251](https://nvd.nist.gov/vuln/detail/CVE-2015-9251)
* [CVE-2012-6708](https://www.cve.org/CVERecord?id=CVE-2012-6708)
* [CVE-2015-9251](https://www.cve.org/CVERecord?id=CVE-2015-9251)

Es wird allen Ruby-Nutzern nachdrücklich empfohlen, die Ruby-Version
zu aktualisieren oder wenigstens einen der nachfolgenden Workarounds
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -45,6 +45,6 @@ details, please find discussions and resources around CVE-2011-3389.


[1]: http://www.openssl.org/~bodo/tls-cbc.txt
[2]: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389
[2]: https://www.cve.org/CVERecord?id=CVE-2011-3389
[3]: https://bugs.ruby-lang.org/5353
[4]: http://mla.n-z.jp/?ruby-talk=393484
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ lang: en
There is a severe vulnerability in OpenSSL's implementation of the TLS/DTLS
(transport layer security protocols) heartbeat extension (`RFC6520`).
This a serious vulnerability which has been assigned the CVE identifier
[CVE-2014-0160](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160).
[CVE-2014-0160](https://www.cve.org/CVERecord?id=CVE-2014-0160).

Exploitation may lead to disclosure of memory contents from the server to the
client and from the client to the server. An attacker can remotely retrieve
Expand Down
2 changes: 1 addition & 1 deletion en/news/_posts/2014-08-19-ruby-1-9-2-p330-released.md
Original file line number Diff line number Diff line change
Expand Up @@ -52,4 +52,4 @@ You can read the original report on the bug tracker:
We encourage you to upgrade to a stable and maintained
[version of Ruby](https://www.ruby-lang.org/en/downloads/).

[CVE-2014-6438]: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6438
[CVE-2014-6438]: https://www.cve.org/CVERecord?id=CVE-2014-6438
Original file line number Diff line number Diff line change
Expand Up @@ -16,8 +16,8 @@ All Ruby users are recommended to update Ruby to the latest release which includ

The following vulnerabilities have been reported.

* [CVE-2012-6708](https://nvd.nist.gov/vuln/detail/CVE-2012-6708)
* [CVE-2015-9251](https://nvd.nist.gov/vuln/detail/CVE-2015-9251)
* [CVE-2012-6708](https://www.cve.org/CVERecord?id=CVE-2012-6708)
* [CVE-2015-9251](https://www.cve.org/CVERecord?id=CVE-2015-9251)

It is strongly recommended for all Ruby users to upgrade your Ruby installation or take one of the following workarounds as soon as possible.
You also have to re-generate existing RDoc documentations to completely mitigate the vulnerabilities.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ It is recommended that all Ruby users update RDoc to the latest version that fix

The following vulnerability has been reported.

* [CVE-2021-31799](https://nvd.nist.gov/vuln/detail/CVE-2021-31799)
* [CVE-2021-31799](https://www.cve.org/CVERecord?id=CVE-2021-31799)

RDoc used to call `Kernel#open` to open a local file. If a Ruby project has a file whose name starts with `|` and ends with `tags`, the command following the pipe character is executed. A malicious Ruby project could exploit it to run an arbitrary command execution against a user who attempts to run `rdoc` command.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ lang: en
---

A StartTLS stripping vulnerability was discovered in Net::IMAP.
This vulnerability has been assigned the CVE identifier [CVE-2021-32066](https://nvd.nist.gov/vuln/detail/CVE-2021-32066).
This vulnerability has been assigned the CVE identifier [CVE-2021-32066](https://www.cve.org/CVERecord?id=CVE-2021-32066).
We strongly recommend upgrading Ruby.

net-imap is a default gem in Ruby 3.0.1 but it has a packaging issue, so please upgrade Ruby itself.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ lang: en
---

A trusting FTP PASV responses vulnerability was discovered in Net::FTP.
This vulnerability has been assigned the CVE identifier [CVE-2021-31810](https://nvd.nist.gov/vuln/detail/CVE-2021-31810).
This vulnerability has been assigned the CVE identifier [CVE-2021-31810](https://www.cve.org/CVERecord?id=CVE-2021-31810).
We strongly recommend upgrading Ruby.

net-ftp is a default gem in Ruby 3.0.1 but it has a packaging issue, so please upgrade Ruby itself.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ lang: en
---

We have released date gem version 3.2.1, 3.1.2, 3.0.2, and 2.0.1 that include a security fix for a regular expression denial of service vulnerability (ReDoS) on date parsing methods. An attacker can exploit this vulnerability to cause an effective DoS attack.
This vulnerability has been assigned the CVE identifier [CVE-2021-41817](https://nvd.nist.gov/vuln/detail/CVE-2021-41817).
This vulnerability has been assigned the CVE identifier [CVE-2021-41817](https://www.cve.org/CVERecord?id=CVE-2021-41817).

## Details

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ lang: en
---

A buffer overrun vulnerability was discovered in CGI.escape_html.
This vulnerability has been assigned the CVE identifier [CVE-2021-41816](https://nvd.nist.gov/vuln/detail/CVE-2021-41816).
This vulnerability has been assigned the CVE identifier [CVE-2021-41816](https://www.cve.org/CVERecord?id=CVE-2021-41816).
We strongly recommend upgrading Ruby.

## Details
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ lang: en
---

A cookie prefix spoofing vulnerability was discovered in CGI::Cookie.parse.
This vulnerability has been assigned the CVE identifier [CVE-2021-41819](https://nvd.nist.gov/vuln/detail/CVE-2021-41819).
This vulnerability has been assigned the CVE identifier [CVE-2021-41819](https://www.cve.org/CVERecord?id=CVE-2021-41819).
We strongly recommend upgrading Ruby.

## Details
Expand All @@ -20,7 +20,7 @@ An attacker could exploit this vulnerability to spoof security prefixes in cooki
By this fix, `CGI::Cookie.parse` no longer decodes cookie names.
Note that this is an incompatibility if cookie names that you are using include non-alphanumeric characters that are URL-encoded.

This is the same issue of [CVE-2020-8184](https://nvd.nist.gov/vuln/detail/CVE-2020-8184).
This is the same issue of [CVE-2020-8184](https://www.cve.org/CVERecord?id=CVE-2020-8184).

If you are using Ruby 2.7 or 3.0:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ lang: en
---

A buffer-overrun vulnerability is discovered in a conversion algorithm from a String to a Float.
This vulnerability has been assigned the CVE identifier [CVE-2022-28739](https://nvd.nist.gov/vuln/detail/CVE-2022-28739).
This vulnerability has been assigned the CVE identifier [CVE-2022-28739](https://www.cve.org/CVERecord?id=CVE-2022-28739).
We strongly recommend upgrading Ruby.

## Details
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ lang: en
---

A double-free vulnerability is discovered in Regexp compilation.
This vulnerability has been assigned the CVE identifier [CVE-2022-28738](https://nvd.nist.gov/vuln/detail/CVE-2022-28738).
This vulnerability has been assigned the CVE identifier [CVE-2022-28738](https://www.cve.org/CVERecord?id=CVE-2022-28738).
We strongly recommend upgrading Ruby.

## Details
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ lang: en
---

We have released the cgi gem version 0.3.5, 0.2.2, and 0.1.0.2 that has a security fix for a HTTP response splitting vulnerability.
This vulnerability has been assigned the CVE identifier [CVE-2021-33621](https://nvd.nist.gov/vuln/detail/CVE-2021-33621).
This vulnerability has been assigned the CVE identifier [CVE-2021-33621](https://www.cve.org/CVERecord?id=CVE-2021-33621).

## Details

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ lang: es
Existe una vulnerabilidad severa en la implementación OpenSSL de la extensión
TLS/DTLS (transport layer security protocols) heartbeat (`RFC6520`).
Esta vulnerabilidad es muy severa y se le ha asignado el identificador
[CVE-2014-0160](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160).
[CVE-2014-0160](https://www.cve.org/CVERecord?id=CVE-2014-0160).

La explotación de esta vulnerabilidad puede llevar a la revelación de el
contenido de la memoria del servidor al cliente y del cliente hacia el servidor.
Expand Down
2 changes: 1 addition & 1 deletion es/news/_posts/2014-08-19-ruby-1-9-2-p330-released.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,4 +53,4 @@ Puedes leer el reporte original de el problema en el tracker:
Te recomendamos que actualices a una versión
[estable y mantendida de Ruby](https://www.ruby-lang.org/es/downloads/).

[CVE-2014-6438]: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6438
[CVE-2014-6438]: https://www.cve.org/CVERecord?id=CVE-2014-6438
Original file line number Diff line number Diff line change
Expand Up @@ -18,8 +18,8 @@ más reciente que incluye la versión reparada de RDoc.

Se han reportado las siguientes vulnerabilidades.

* [CVE-2012-6708](https://nvd.nist.gov/vuln/detail/CVE-2012-6708)
* [CVE-2015-9251](https://nvd.nist.gov/vuln/detail/CVE-2015-9251)
* [CVE-2012-6708](https://www.cve.org/CVERecord?id=CVE-2012-6708)
* [CVE-2015-9251](https://www.cve.org/CVERecord?id=CVE-2015-9251)

Se recomienda de manera especial a todos los usuarios de Ruby actualizar
la instalación de Ruby o emplear tan pronto sea posible una de las
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ la versión más reciente que resuelve el problema.

Se ha reportado la siguiente vulnerabilidad.

* [CVE-2021-31799](https://nvd.nist.gov/vuln/detail/CVE-2021-31799)
* [CVE-2021-31799](https://www.cve.org/CVERecord?id=CVE-2021-31799)

RDoc solía llamar `Kernel#open` para abrir un archivo local.
Si un proyecto Ruby tiene un archivo cuyo nombre comience con `|`
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ lang: es

Se descubrió una vulnerabilidad de recortado de StartTLS en Net::IMAP.
A esta vulnerabilidad se le ha asignado el identificador CVE
[CVE-2021-32066](https://nvd.nist.gov/vuln/detail/CVE-2021-32066).
[CVE-2021-32066](https://www.cve.org/CVERecord?id=CVE-2021-32066).
Recomendamos enfáticamente actualizar Ruby.

net-imap es una gema predeterminada en Ruby 3.0.1 pero tiene un problema
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ lang: es
Se ha descubierto una vulnerabilidad en Net::FTP por confiar en respuestas
FTP PASV.
A eta vulnerabilidad se le ha asignado el identificador CVE
[CVE-2021-31810](https://nvd.nist.gov/vuln/detail/CVE-2021-31810).
[CVE-2021-31810](https://www.cve.org/CVERecord?id=CVE-2021-31810).
Recomendamos enfáticamente actualizar Ruby.

net-ftp es una gema predeterminada en Ruby 3.0.1 pero tiene un
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ Un atacante podría explotar esta vulnerabilidad para generar
un ataque de denegación de servicio efectivo.

A esta vulnerabilidad se le ha asignado el identificador CVE
[CVE-2021-41817](https://nvd.nist.gov/vuln/detail/CVE-2021-41817).
[CVE-2021-41817](https://www.cve.org/CVERecord?id=CVE-2021-41817).

## Detalles

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ lang: es
Una vulnerabilidad de desbordamiento de búfer fue descubierta en
CGI.escape_html.
A esta vulnerabilidad se le ha asignado el identificador CVE
[CVE-2021-41816](https://nvd.nist.gov/vuln/detail/CVE-2021-41816).
[CVE-2021-41816](https://www.cve.org/CVERecord?id=CVE-2021-41816).
Recomendamos enfáticamente actualizar Ruby.

## Detalles
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ lang: es
Se descubrió una vulnerabilidad de suplantación de identidad de prefijos de
galletas (cookies) en CGI::Cookie.parse.
A esta vulnerabilidad se el ha asignado el identificador
CVE [CVE-2021-41819](https://nvd.nist.gov/vuln/detail/CVE-2021-41819).
CVE [CVE-2021-41819](https://www.cve.org/CVERecord?id=CVE-2021-41819).
Recomendamos con énfasis actualizar Ruby.

## Detalles
Expand All @@ -28,7 +28,7 @@ Note que esto es una incompatibilidad si los nombres de galletas que
está usando incluyendo carácteres no alfanuméricos que no están
codificados como URL.

Este es el mismo incidente [CVE-2020-8184](https://nvd.nist.gov/vuln/detail/CVE-2020-8184).
Este es el mismo incidente [CVE-2020-8184](https://www.cve.org/CVERecord?id=CVE-2020-8184).

Si está usando Ruby 2.7 o 3.0:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ lang: es
Se descubrió una vulnerabilidad de desbordamiento de buffer en un algoritmo de
conversión de String a Float.
A esta vulnerabilidad se le ha asignado el identificador CVE
[CVE-2022-28739](https://nvd.nist.gov/vuln/detail/CVE-2022-28739).
[CVE-2022-28739](https://www.cve.org/CVERecord?id=CVE-2022-28739).
Recomendamos actualizar Ruby con urgencia.

## Detalles
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ lang: es
Una vulnerabilidad de doble free ha sido descubierta en la
compilación de expresiones regulares.
A esta vulnerabilidad se le ha asignado el identificador CVE
[CVE-2022-28738](https://nvd.nist.gov/vuln/detail/CVE-2022-28738).
[CVE-2022-28738](https://www.cve.org/CVERecord?id=CVE-2022-28738).
Recomendamos actualizar Ruby con urgencia.

## Detalles
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Hemos publicado las versiones 0.3.5, 0.2.2 y 0.1.0.2 de la gema cgi,
que incluyen una corrección de seguridad para una vulnerabilidad
de división de respuesta HTTP.
A esta vulnerabilidad se le ha asignado el identificador CVE
[CVE-2021-33621](https://nvd.nist.gov/vuln/detail/CVE-2021-33621).
[CVE-2021-33621](https://www.cve.org/CVERecord?id=CVE-2021-33621).

## Detalles

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,6 @@ renseignez-vous sur CVE-2011-3389.


[1]: http://www.openssl.org/~bodo/tls-cbc.txt
[2]: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389
[2]: https://www.cve.org/CVERecord?id=CVE-2011-3389
[3]: https://bugs.ruby-lang.org/5353
[4]: http://mla.n-z.jp/?ruby-talk=393484
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ lang: fr
Une faille critique a été découverte dans l'implémentation d'OpenSSL de
l'extension TLS/DTLS (transport layer security protocols) heartbeat (`RFC6520`).
Cette faille est critique et est référencée par l'identifiant CVE (Common Vulnerabilities and Exposures)
[CVE-2014-0160](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160).
[CVE-2014-0160](https://www.cve.org/CVERecord?id=CVE-2014-0160).

L'exploitation de cette faille peut permettre l'accès au contenu de la mémoire
du serveur au client et du client au serveur. Un attaquant peut récupérer à
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ Il est recommandé aux utilisateurs de Ruby de mettre à jour RDoc vers la derni

La faille suivante a été signalée.

- [CVE-2021-31799](https://nvd.nist.gov/vuln/detail/CVE-2021-31799)
- [CVE-2021-31799](https://www.cve.org/CVERecord?id=CVE-2021-31799)

RDoc fait appel à `Kernel#open` pour ouvrir un fichier localement. Si un projet Ruby possède un fichier dont le nom commence par `|` et se termine par `tags`, alors la commande suivant le pipe (barre verticale) est exécutée. Un projet Ruby malveillant pourrait exploiter ce comportement pour exécuter des commandes arbitraires à l'encontre de l'utilisateur qui tente de lancer `rdoc`

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ lang: fr
---

Une vulnérabilité StartTLS stripping a été découverte dans Net::IMAP.
Cette vulnérabilité possède l'identifiant CVE [CVE-2021-32066](https://nvd.nist.gov/vuln/detail/CVE-2021-32066).
Cette vulnérabilité possède l'identifiant CVE [CVE-2021-32066](https://www.cve.org/CVERecord?id=CVE-2021-32066).
Nous vous recommandons fortement de mettre à jour Ruby.

net-imap est une gemme incluse par défaut dans Ruby 3.0.1, mais a un problème d'empaquetage. Veuillez donc mettre à jour Ruby lui-même.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ lang: fr
---

Une vulnérabilité concernant la confiance des réponses FTP PASV a été découverte dans Net::FTP.
Cette vulnérabilité possède l'identifiant CVE [CVE-2021-31810](https://nvd.nist.gov/vuln/detail/CVE-2021-31810).
Cette vulnérabilité possède l'identifiant CVE [CVE-2021-31810](https://www.cve.org/CVERecord?id=CVE-2021-31810).
Nous vous recommandons fortement de mettre à jour Ruby.

net-ftp est une gemme incluse par défaut dans Ruby 3.0.1, mais a un problème d'empaquetage. Veuillez donc mettre à jour Ruby lui-même.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ tags: security
lang: fr
---

Nous avons publié les versions 3.2.1, 3.1.2, 3.0.2 et 2.0.1 de la gemme date qui incluent un correctif de sécurité pour une vulnérabilité de déni de service d'expression régulière (ReDoS) sur les méthodes d'analyse de date. Un attaquant peut exploiter cette vulnérabilité pour provoquer une attaque DoS efficace. Cette vulnérabilité a reçu l'identifiant CVE [CVE-2021-41817](https://nvd.nist.gov/vuln/detail/CVE-2021-41817).
Nous avons publié les versions 3.2.1, 3.1.2, 3.0.2 et 2.0.1 de la gemme date qui incluent un correctif de sécurité pour une vulnérabilité de déni de service d'expression régulière (ReDoS) sur les méthodes d'analyse de date. Un attaquant peut exploiter cette vulnérabilité pour provoquer une attaque DoS efficace. Cette vulnérabilité a reçu l'identifiant CVE [CVE-2021-41817](https://www.cve.org/CVERecord?id=CVE-2021-41817).

## Détails

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ tags: security
lang: fr
---

Une vulnérabilité de dépassement de mémoire tampon a été découverte dans CGI.escape_html. Cette vulnérabilité a reçu l'identifiant CVE [CVE-2021-41816](https://nvd.nist.gov/vuln/detail/CVE-2021-41816).
Une vulnérabilité de dépassement de mémoire tampon a été découverte dans CGI.escape_html. Cette vulnérabilité a reçu l'identifiant CVE [CVE-2021-41816](https://www.cve.org/CVERecord?id=CVE-2021-41816).
Nous vous recommandons fortement de mettre à jour Ruby.

## Détails
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ tags: security
lang: fr
---

Une vulnérabilité d'usurpation de préfixes de cookie a été découverte dans CGI::Cookie.parse. Cette vulnérabilité a reçu l'identifiant CVE [CVE-2021-41819](https://nvd.nist.gov/vuln/detail/CVE-2021-41819).
Une vulnérabilité d'usurpation de préfixes de cookie a été découverte dans CGI::Cookie.parse. Cette vulnérabilité a reçu l'identifiant CVE [CVE-2021-41819](https://www.cve.org/CVERecord?id=CVE-2021-41819).
Nous vous recommandons fortement de mettre à jour Ruby.

## Détails
Expand All @@ -17,7 +17,7 @@ Les anciennes versions de `CGI::Cookie.parse` appliquent le décodage d'URL aux

Par ce correctif, `CGI::Cookie.parse` ne décode plus les noms de cookies. Notez qu'il s'agit d'une incompatibilité si les noms de cookies que vous utilisez incluent des caractères non alphanumériques URL encodés.

C'est le même problème que [CVE-2020-8184](https://nvd.nist.gov/vuln/detail/CVE-2020-8184).
C'est le même problème que [CVE-2020-8184](https://www.cve.org/CVERecord?id=CVE-2020-8184).

Si vous utilisez Ruby 2.7 ou 3.0 :

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,6 @@ seputar CVE-2011-3389.


[1]: http://www.openssl.org/~bodo/tls-cbc.txt
[2]: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389
[2]: https://www.cve.org/CVERecord?id=CVE-2011-3389
[3]: https://bugs.ruby-lang.org/5353
[4]: http://mla.n-z.jp/?ruby-talk=393484
Original file line number Diff line number Diff line change
Expand Up @@ -18,8 +18,8 @@ mana berisi perbaikan versi RDoc.

Kerentanan berikut ini telah dilaporkan.

* [CVE-2012-6708](https://nvd.nist.gov/vuln/detail/CVE-2012-6708)
* [CVE-2015-9251](https://nvd.nist.gov/vuln/detail/CVE-2015-9251)
* [CVE-2012-6708](https://www.cve.org/CVERecord?id=CVE-2012-6708)
* [CVE-2015-9251](https://www.cve.org/CVERecord?id=CVE-2015-9251)

Semua pengguna Ruby sangat disarankan untuk memperbarui Ruby atau mengambil
salah satu solusi berikut segera mungkin.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ terbaru untuk memperbaiki kerentanan ini.

Berikut adalah kerentanan yang telah dilaporkan.

* [CVE-2021-31799](https://nvd.nist.gov/vuln/detail/CVE-2021-31799)
* [CVE-2021-31799](https://www.cve.org/CVERecord?id=CVE-2021-31799)

RDoc sebelumnya memanggil `Kernel#open` untuk membuat sebuah berkas lokal. Jika
sebuah proyek Ruby memiliki sebuah berkas yang mana nama berkas dimulai dengan
Expand Down
Loading