A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
References
Link | Resource |
---|---|
https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/07/msg00013.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/ | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4088-1/ | Third Party Advisory |
https://support.f5.com/csp/article/K00103182 | Third Party Advisory |
https://support.f5.com/csp/article/K00103182?utm_source=f5support&utm_medium=RSS | Third Party Advisory |
https://security.gentoo.org/glsa/201911-03 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2019-07-10 07:15
Updated : 2022-07-20 09:33
NVD link : CVE-2019-13224
Mitre link : CVE-2019-13224
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
oniguruma_project
- oniguruma
fedoraproject
- fedora
canonical
- ubuntu_linux
php
- php
debian
- debian_linux