CVE-2022-41715 — Standard Library Regexp Syntax vulnerability
10 documents8 sources
Severity
7.5HIGHNVD
EPSS
0.0%
top 96.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 14
Latest updateApr 25
Description
Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
Patches
🔴Vulnerability Details
5OSV▶
CVE-2022-41715: Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service↗2022-10-14
GHSA▶
GHSA-5wvm-rxcf-6cg8: Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service↗2022-10-14
📋Vendor Advisories
4Debian▶
CVE-2022-41715: golang-1.15 - Programs which compile regular expressions from untrusted sources may be vulnera...↗2022