{"id":"MGASA-2022-0454","summary":"Updated ruby packages fix security vulnerability","details":"If an application that generates HTTP responses using the cgi gem with\nuntrusted user input, an attacker can exploit it to inject a malicious\nHTTP response header and/or body.\n\nAlso, the contents for a CGI::Cookie object were not checked properly. If\nan application creates a CGI::Cookie object based on user input, an\nattacker may exploit it to inject invalid attributes in Set-Cookie header.\nSuch applications are unlikely, but a change is included to check\narguments for CGI::Cookie#initialize preventatively.\n","modified":"2026-04-16T00:10:57.940567255Z","published":"2022-12-13T22:09:19Z","upstream":["CVE-2021-33621"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0454.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=31187"},{"type":"WEB","url":"http://www.ruby-lang.org/en/news/2022/11/22/http-response-splitting-in-cgi-cve-2021-33621/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/YACE6ORF2QBXXBK2V2CM36D7TZMEJVAS/"}],"affected":[{"package":{"name":"ruby","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/ruby?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.7-33.6.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0454.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}