Lucene search

K
cveGoCVE-2022-41715
HistoryOct 14, 2022 - 3:16 p.m.

CVE-2022-41715

2022-10-1415:16:20
Go
web.nvd.nist.gov
388
8
cve-2022-41715
memory exhaustion
denial of service
regular expressions
input parsing
nvd

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.002

Percentile

60.1%

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

Affected configurations

Nvd
Node
golanggoRange<1.18.7
OR
golanggoRange1.19.01.19.2
VendorProductVersionCPE
golanggo*cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Go standard library",
    "product": "regexp/syntax",
    "collectionURL": "https://pkg.go.dev",
    "packageName": "regexp/syntax",
    "versions": [
      {
        "version": "0",
        "lessThan": "1.18.7",
        "status": "affected",
        "versionType": "semver"
      },
      {
        "version": "1.19.0-0",
        "lessThan": "1.19.2",
        "status": "affected",
        "versionType": "semver"
      }
    ],
    "programRoutines": [
      {
        "name": "parser.push"
      },
      {
        "name": "parser.repeat"
      },
      {
        "name": "parser.factor"
      },
      {
        "name": "parse"
      },
      {
        "name": "Parse"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

Social References

More

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.002

Percentile

60.1%