CVE-2021-41817

NameCVE-2021-41817
DescriptionDate.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2853-1, ELA-531-1
NVD severitymedium
Debian Bugs1002995

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby2.1 (PTS)jessie, jessie (lts)2.1.5-2+deb8u13fixed
ruby2.3 (PTS)stretch2.3.3-1+deb9u8vulnerable
stretch (security)2.3.3-1+deb9u11fixed
ruby2.5 (PTS)buster2.5.5-3+deb10u3vulnerable
buster (security)2.5.5-3+deb10u2vulnerable
ruby2.7 (PTS)bookworm, bullseye2.7.4-1vulnerable
sid2.7.5-1fixed
ruby3.0 (PTS)sid, bookworm3.0.2-5vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby2.1sourcejessie2.1.5-2+deb8u13ELA-531-1
ruby2.1source(unstable)(unfixed)
ruby2.3sourcestretch2.3.3-1+deb9u11DLA-2853-1
ruby2.3source(unstable)(unfixed)
ruby2.5source(unstable)(unfixed)
ruby2.7source(unstable)2.7.5-1
ruby3.0source(unstable)(unfixed)1002995

Notes

Fixed in Ruby 3.0.3, 2.7.5, 2.6.9
https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/
Fixed by: https://github.com/ruby/date/commit/3959accef8da5c128f8a8e2fd54e932a4fb253b0 (v3.2.2)
Followups to mimic previous behaviour:
https://github.com/ruby/date/commit/8f2d7a0c7e52cea8333824bd527822e5449ed83d (v3.2.2)
https://github.com/ruby/date/commit/376c65942bd1d81803f14d37351737df60ec4664 (v3.2.2)

Search for package or bug name: Reporting problems