Description
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1854-1 | libonig security update |
Debian DLA |
DLA-2431-1 | [SECURITY][DLA 2431-1] libonig security update |
EUVD |
EUVD-2019-4737 | A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust. |
Ubuntu USN |
USN-4088-1 | PHP vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:49:24.159Z
Reserved: 2019-07-03T00:00:00.000Z
Link: CVE-2019-13224
No data.
Status : Modified
Published: 2019-07-10T14:15:11.607
Modified: 2024-11-21T04:24:29.107
Link: CVE-2019-13224
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN