Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6161 | rulex is a new, portable, regular expression language. When parsing untrusted rulex expressions, the stack may overflow, possibly enabling a Denial of Service attack. This happens when parsing an expression with several hundred levels of nesting, causing the process to abort immediately. This is a security concern for you, if your service parses untrusted rulex expressions (expressions provided by an untrusted user), and your service becomes unavailable when the process running rulex aborts due to a stack overflow. The crash is fixed in version **0.4.3**. Affected users are advised to update to this version. There are no known workarounds for this issue. |
Github GHSA |
GHSA-v78m-2q7v-fjqp | Uncontrolled Recursion in rulex |
Wed, 23 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T18:06:21.333Z
Reserved: 2022-05-18T00:00:00.000Z
Link: CVE-2022-31099
Updated: 2024-08-03T07:11:39.533Z
Status : Modified
Published: 2022-06-27T23:15:08.043
Modified: 2024-11-21T07:03:53.550
Link: CVE-2022-31099
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA