{"id":"USN-5610-1","summary":"rust-regex vulnerability","details":"Addison Crump discovered that rust-regex did not properly limit\nthe complexity of the regular expressions (regex) it parses.\nAn attacker could possibly use this issue to cause a denial of\nservice.\n","modified":"2026-02-10T04:42:46Z","published":"2022-09-14T08:30:19Z","related":["UBUNTU-CVE-2022-24713"],"upstream":["CVE-2022-24713","UBUNTU-CVE-2022-24713"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5610-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-24713"}],"affected":[{"package":{"name":"rust-regex","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/rust-regex@1.2.1-3ubuntu0.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.1-3ubuntu0.1"}]}],"versions":["1.2.1-3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"librust-regex-dev","binary_version":"1.2.1-3ubuntu0.1"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-24713"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5610-1.json"}},{"package":{"name":"rust-regex","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/rust-regex@1.5.4-1ubuntu0.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.4-1ubuntu0.1"}]}],"versions":["1.3.7-1","1.3.9-1","1.5.4-1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"librust-regex+aho-corasick-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex+default-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex+memchr-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex+perf-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex+perf-literal-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex+unicode-age-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex+unicode-bool-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex+unicode-case-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex+unicode-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex+unicode-gencat-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex+unicode-perl-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex+unicode-script-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex+unicode-segment-dev","binary_version":"1.5.4-1ubuntu0.1"},{"binary_name":"librust-regex-dev","binary_version":"1.5.4-1ubuntu0.1"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-24713"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5610-1.json"}}],"schema_version":"1.7.3"}