The rust regex crate did not properly prevent crafted regular expressions from taking an arbitrary amount of time during parsing. If an attacker was able to supply input to this crate, they could have caused a denial of service in the browser. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/#CVE-2022-24713
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:1283 https://access.redhat.com/errata/RHSA-2022:1283
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:1286 https://access.redhat.com/errata/RHSA-2022:1286
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1287 https://access.redhat.com/errata/RHSA-2022:1287
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:1285 https://access.redhat.com/errata/RHSA-2022:1285
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:1284 https://access.redhat.com/errata/RHSA-2022:1284
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:1303 https://access.redhat.com/errata/RHSA-2022:1303
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1301 https://access.redhat.com/errata/RHSA-2022:1301
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:1305 https://access.redhat.com/errata/RHSA-2022:1305
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:1302 https://access.redhat.com/errata/RHSA-2022:1302
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:1326 https://access.redhat.com/errata/RHSA-2022:1326
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-24713