rulex is a new, portable, regular expression language. When parsing untrusted rulex expressions, rulex may crash, possibly enabling a Denial of Service attack. This happens when the expression contains a multi-byte UTF-8 code point in a string literal or after a backslash, because rulex tries to slice into the code point and panics as a result. This is a security concern for you, if your service parses untrusted rulex expressions (expressions provided by an untrusted user), and your service becomes unavailable when the thread running rulex panics. The crashes are fixed in version **0.4.3**. Affected users are advised to update to this version. The only known workaround for this issue is to assume that regular expression parsing will panic and to add logic to catch panics.
References
Link | Resource |
---|---|
https://github.com/rulex-rs/rulex/commit/fac6d58b25c6f9f8c0a6cdc4dec75b37b219f1d6 | Patch Third Party Advisory |
https://github.com/rulex-rs/rulex/security/advisories/GHSA-8v9w-p43c-r885 | Mitigation Third Party Advisory |
https://github.com/rulex-rs/rulex/commit/fac6d58b25c6f9f8c0a6cdc4dec75b37b219f1d6 | Patch Third Party Advisory |
https://github.com/rulex-rs/rulex/security/advisories/GHSA-8v9w-p43c-r885 | Mitigation Third Party Advisory |
Configurations
History
21 Nov 2024, 07:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/rulex-rs/rulex/commit/fac6d58b25c6f9f8c0a6cdc4dec75b37b219f1d6 - Patch, Third Party Advisory | |
References | () https://github.com/rulex-rs/rulex/security/advisories/GHSA-8v9w-p43c-r885 - Mitigation, Third Party Advisory |
Information
Published : 2022-06-27 22:15
Updated : 2024-11-21 07:03
NVD link : CVE-2022-31100
Mitre link : CVE-2022-31100
CVE.ORG link : CVE-2022-31100
JSON object : View
Products Affected
pomsky-lang
- pomsky
CWE
CWE-617
Reachable Assertion