rulex is a new, portable, regular expression language. When parsing untrusted rulex expressions, the stack may overflow, possibly enabling a Denial of Service attack. This happens when parsing an expression with several hundred levels of nesting, causing the process to abort immediately. This is a security concern for you, if your service parses untrusted rulex expressions (expressions provided by an untrusted user), and your service becomes unavailable when the process running rulex aborts due to a stack overflow. The crash is fixed in version **0.4.3**. Affected users are advised to update to this version. There are no known workarounds for this issue.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 23 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-06-27T22:10:20.000Z
Updated: 2025-04-23T18:06:21.333Z
Reserved: 2022-05-18T00:00:00.000Z
Link: CVE-2022-31099
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-03T07:11:39.533Z
 NVD
                        NVD
                    Status : Modified
Published: 2022-06-27T23:15:08.043
Modified: 2024-11-21T07:03:53.550
Link: CVE-2022-31099
 Redhat
                        Redhat
                    No data.