CVE-2021-41817
Published: 1 January 2022
Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
ruby2.3 Launchpad, Ubuntu, Debian |
trusty |
Ignored
(out of standard support)
|
upstream |
Needs triage
|
|
xenial |
Released
(2.3.1-2~ubuntu16.04.16+esm2)
|
|
ruby2.5 Launchpad, Ubuntu, Debian |
bionic |
Released
(2.5.1-1ubuntu1.11)
|
trusty |
Ignored
(out of standard support)
|
|
upstream |
Needs triage
|
|
xenial |
Ignored
(out of standard support)
|
|
ruby2.7 Launchpad, Ubuntu, Debian |
focal |
Released
(2.7.0-5ubuntu1.6)
|
hirsute |
Released
(2.7.2-4ubuntu1.3)
|
|
impish |
Released
(2.7.4-1ubuntu3.1)
|
|
trusty |
Ignored
(out of standard support)
|
|
upstream |
Needs triage
|
|
xenial |
Ignored
(out of standard support)
|
|
ruby3.0 Launchpad, Ubuntu, Debian |
jammy |
Released
(3.0.2-7ubuntu2)
|
trusty |
Ignored
(out of standard support)
|
|
upstream |
Needs triage
|
|
xenial |
Ignored
(out of standard support)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817
- https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/
- https://github.com/ruby/date/commit/3959accef8da5c128f8a8e2fd54e932a4fb253b0 (Fix)
- https://github.com/ruby/date/commit/8f2d7a0c7e52cea8333824bd527822e5449ed83d (v3.2.2 - followups to mimic prev behaviour)
- https://github.com/ruby/date/commit/376c65942bd1d81803f14d37351737df60ec4664 (v3.2.2 - followups to mimic prev behaviour)
- https://ubuntu.com/security/notices/USN-5235-1
- NVD
- Launchpad
- Debian