[DSA-5067-1] ruby2.7
Severity
Critical
Affected Packages
1
CVEs
3
security update
no info
Package | Affected Version |
---|---|
pkg:deb/debian/ruby2.7?distro=bullseye | < 2.7.4-1+deb11u1 |
- ID
- DSA-5067-1
- Severity
- critical
- Severity from
- CVE-2021-41816
- URL
- https://www.debian.org/security/dsa-5067-1
- Published
-
2022-02-03T00:00:00
(2 years ago) - Modified
-
2022-02-03T00:00:00
(2 years ago) - Other Advisories
-
- ALAS2-2023-2345
- ALAS2-2024-2486
- ALPINE:CVE-2021-41816
- ALPINE:CVE-2021-41817
- ALPINE:CVE-2021-41819
- ALSA-2022:0543
- ALSA-2022:5779
- ALSA-2022:6447
- ALSA-2022:6450
- DSA-5066-1
- ELSA-2022-0543
- ELSA-2022-5779
- ELSA-2022-6447
- ELSA-2022-6450
- FEDORA-2022-82a9edac27
- FEDORA-2022-8cf0124add
- FREEBSD:2C6AF5C3-4D36-11EC-A539-0800270512F4
- FREEBSD:4548EC97-4D38-11EC-A539-0800270512F4
- FREEBSD:6916EA94-4628-11EC-BBE2-0800270512F4
- GLSA-202401-27
- MS:CVE-2021-41817
- MS:CVE-2021-41819
- RHSA-2022:0543
- RHSA-2022:5779
- RHSA-2022:6447
- RHSA-2022:6450
- RLSA-2022:0543
- RLSA-2022:5779
- RLSA-2022:6447
- RLSA-2022:6450
- RUBYSEC:CGI-2021-41816
- RUBYSEC:CGI-2021-41819
- RUBYSEC:DATE-2021-41817
- SUSE-SU-2022:1512-1
- SUSE-SU-2022:3292-1
- SUSE-SU-2023:4176-1
- USN-5235-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2021-41816 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41816 | |
CVE | CVE-2021-41817 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817 | |
CVE | CVE-2021-41819 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/debian/ruby2.7?distro=bullseye | debian | ruby2.7 | < 2.7.4-1+deb11u1 | bullseye |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |