U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-24713 Detail

Description

regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e Patch  Third Party Advisory 
https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e Patch  Third Party Advisory 
https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8 Third Party Advisory 
https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8 Third Party Advisory 
https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw Third Party Advisory 
https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw Third Party Advisory 
https://lists.debian.org/debian-lts-announce/2022/04/msg00003.html Mailing List  Third Party Advisory 
https://lists.debian.org/debian-lts-announce/2022/04/msg00003.html Mailing List  Third Party Advisory 
https://lists.debian.org/debian-lts-announce/2022/04/msg00009.html Mailing List  Third Party Advisory 
https://lists.debian.org/debian-lts-announce/2022/04/msg00009.html Mailing List  Third Party Advisory 
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/
https://security.gentoo.org/glsa/202208-08 Third Party Advisory 
https://security.gentoo.org/glsa/202208-08 Third Party Advisory 
https://security.gentoo.org/glsa/202208-14 Third Party Advisory 
https://security.gentoo.org/glsa/202208-14 Third Party Advisory 
https://www.debian.org/security/2022/dsa-5113 Third Party Advisory 
https://www.debian.org/security/2022/dsa-5113 Third Party Advisory 
https://www.debian.org/security/2022/dsa-5118 Third Party Advisory 
https://www.debian.org/security/2022/dsa-5118 Third Party Advisory 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-1333 Inefficient Regular Expression Complexity cwe source acceptance level NIST  
CWE-400 Uncontrolled Resource Consumption GitHub, Inc.  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

14 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-24713
NVD Published Date:
03/08/2022
NVD Last Modified:
11/21/2024
Source:
GitHub, Inc.