-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.3892
Regular Expression Denial of Service Vunlerability of Date Parsing Methods
                             16 November 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Ruby
                   date gem
Publisher:         Ruby
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Denial of Service -- Unknown/Unspecified
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-41817  

Original Bulletin: 
   https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/

- --------------------------BEGIN INCLUDED TEXT--------------------

CVE-2021-41817: Regular Expression Denial of Service Vunlerability of Date
Parsing Methods

Posted by mame on 15 Nov 2021

We have released date gem version 3.2.1, 3.1.2, 3.0.2, and 2.0.1 that include a
security fix for a regular expression denial of service vulnerability (ReDoS)
on date parsing methods. An attacker can exploit this vulnerability to cause an
effective DoS attack.

Details

Date  s parsing methods including Date.parse are using Regexps internally, some
of which are vulnerable against regular expression denial of service.
Applications and libraries that apply such methods to untrusted input may be
affected.

The fix limits the input length up to 128 bytes by default instead of changing
the regexps. This is because Date gem uses many Regexps and it is possible that
there are still undiscovered vulnerable Regexps. For compatibility, it is
allowed to remove the limitation by explicitly passing limit keywords as nil
like Date.parse(str, limit: nil) , but note that it may take a long time to
parse.

Please update the date gem to version 3.2.1, 3.1.2, 3.0.2, and 2.0.1, or later.
You can use gem update date to update it. If you are using bundler, please add
gem "date", ">= 3.2.1" to your Gemfile .

Affected versions

  o date gem 2.0.0 or prior (which are bundled versions with Ruby 2.6 series)
  o date gem 3.0.1 or prior (which are bundled versions with Ruby 2.7 series)
  o date gem 3.1.1 or prior (which are bundled versions with Ruby 3.0 series)
  o date gem 3.2.0 or prior

Credits

Thanks to svalkanov for discovering this issue.

History

  o Originally published at 2021-11-15 08:00:00 (UTC)

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=LZbv
-----END PGP SIGNATURE-----