Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.3892 Regular Expression Denial of Service Vunlerability of Date Parsing Methods 16 November 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Ruby date gem Publisher: Ruby Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Denial of Service -- Unknown/Unspecified Resolution: Patch/Upgrade CVE Names: CVE-2021-41817 Original Bulletin: https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/ - --------------------------BEGIN INCLUDED TEXT-------------------- CVE-2021-41817: Regular Expression Denial of Service Vunlerability of Date Parsing Methods Posted by mame on 15 Nov 2021 We have released date gem version 3.2.1, 3.1.2, 3.0.2, and 2.0.1 that include a security fix for a regular expression denial of service vulnerability (ReDoS) on date parsing methods. An attacker can exploit this vulnerability to cause an effective DoS attack. Details Date s parsing methods including Date.parse are using Regexps internally, some of which are vulnerable against regular expression denial of service. Applications and libraries that apply such methods to untrusted input may be affected. The fix limits the input length up to 128 bytes by default instead of changing the regexps. This is because Date gem uses many Regexps and it is possible that there are still undiscovered vulnerable Regexps. For compatibility, it is allowed to remove the limitation by explicitly passing limit keywords as nil like Date.parse(str, limit: nil) , but note that it may take a long time to parse. Please update the date gem to version 3.2.1, 3.1.2, 3.0.2, and 2.0.1, or later. You can use gem update date to update it. If you are using bundler, please add gem "date", ">= 3.2.1" to your Gemfile . Affected versions o date gem 2.0.0 or prior (which are bundled versions with Ruby 2.6 series) o date gem 3.0.1 or prior (which are bundled versions with Ruby 2.7 series) o date gem 3.1.1 or prior (which are bundled versions with Ruby 3.0 series) o date gem 3.2.0 or prior Credits Thanks to svalkanov for discovering this issue. History o Originally published at 2021-11-15 08:00:00 (UTC) - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYZMH5uNLKJtyKPYoAQhd/xAAnMBL9/Y390aVF3Pd6Z5o34uWPfUzaPHA QAIQr8jpmQlGlVT6IhOLL0gWMud0o082b+QZCEfIPAqZAVNbK5m/dGhHuczoaZCK OkVm0f25k0MWN3xRVDu8vLQT87ublpHYB2nl3P58tAHxAq+I+xTykWc70bB+HZ6R lA9wK+CxdHN74UqOBozglqw/eiKs780RgmWXNvbb1QcpZNkOqXZB1zml4h6DVxhJ tKDIKAzYfakDmG86bBYYzdaetRxkdmG5GLc1FZXBheF1yBYdZ1+5DXwtesasNPaa m4hiSA4fKa3oFLvT1kscyXe4ZzpX2J1wOkbuZ+ok0xB6CkmImC6n4/tlXtNVX2mV r+jS7qVET09idOefFXB79q87ICCOAzTIU/qacKvk6QQrkWZ0wAta3/wIfretcpb/ gGh5cRw+A4g22UMVKP5Y/SqQGa7JE+mVHReXIbs2Jvd7nS/s7aEW8VDfAQNI3M7A Ll0EdQGPybjMIwAe6o0dvV5iqiiHERKK0ORfXJsdjm8IOuuuoG/H9fsXpUZ6YWUK TxPrqf3hwujZdLmSBU1N1oRIXw7Ir6byEBJEKIk3FnliOtueNNQL0pxBAgwzv6lm NQes0m+RqCAwNr/wAQGqRW8l7HF86TGIYvo0ErTNmnoyG08gJAVNn0ioCgR6htPp Z6Sdx8MUd0I= =LZbv -----END PGP SIGNATURE-----