Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/node-moment@2.29.1%2Bds-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/node-moment@2.29.1%2Bds-2%2Bdeb11u2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-cjwf-nuwg-4yc2 Uncontrolled Resource Consumption The moment module for `Node.js` is prone to a regular expression denial of service via a crafted date string. CVE-2017-18214
GHSA-446m-mv8f-q348
VCID-kexn-gjxj-uudm Path Traversal: 'dir/../../filename' in moment.locale This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale. CVE-2022-24785
GHSA-8hfj-j24r-96c4
VCID-ptd4-8f7f-hyg6 Moment.js vulnerable to Inefficient Regular Expression Complexity ### Impact * using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs * noticeable slowdown is observed with inputs above 10k characters * users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks ### Patches The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. ### Workarounds In general, given the proliferation of ReDoS attacks, it makes sense to limit the length of the user input to something sane, like 200 characters or less. I haven't seen legitimate cases of date-time strings longer than that, so all moment users who do pass a user-originating string to constructor are encouraged to apply such a rudimentary filter, that would help with this but also most future ReDoS vulnerabilities. ### References There is an excellent writeup of the issue here: https://github.com/moment/moment/pull/6015#issuecomment-1152961973= ### Details The issue is rooted in the code that removes legacy comments (stuff inside parenthesis) from strings during rfc2822 parsing. `moment("(".repeat(500000))` will take a few minutes to process, which is unacceptable. CVE-2022-31129
GHSA-wc69-rhjr-hc9g
VCID-quy6-sg5w-qyhe Regular Expression Denial of Service in moment The duration function in the moment package before 2.11.2 for Node.js allows remote attackers to cause a denial of service (CPU consumption) via a long string, aka a "regular expression Denial of Service (ReDoS)." CVE-2016-4055
GHSA-87vv-r9j6-g5qv

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:48:20.197760+00:00 Debian Importer Fixing VCID-cjwf-nuwg-4yc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:13.192556+00:00 Debian Importer Fixing VCID-quy6-sg5w-qyhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:27.094679+00:00 Debian Importer Fixing VCID-ptd4-8f7f-hyg6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:13.231965+00:00 Debian Importer Fixing VCID-kexn-gjxj-uudm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:47:06.476855+00:00 Debian Importer Fixing VCID-cjwf-nuwg-4yc2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:50.177678+00:00 Debian Importer Fixing VCID-quy6-sg5w-qyhe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:34.843407+00:00 Debian Importer Fixing VCID-ptd4-8f7f-hyg6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:39.970003+00:00 Debian Importer Fixing VCID-kexn-gjxj-uudm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:47:12.463430+00:00 Debian Importer Fixing VCID-ptd4-8f7f-hyg6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:47:12.421292+00:00 Debian Importer Fixing VCID-kexn-gjxj-uudm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:47:12.380162+00:00 Debian Importer Fixing VCID-cjwf-nuwg-4yc2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:47:12.343963+00:00 Debian Importer Fixing VCID-quy6-sg5w-qyhe https://security-tracker.debian.org/tracker/data/json 38.1.0