An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2020-1 | libonig security update |
![]() |
DLA-2431-1 | [SECURITY][DLA 2431-1] libonig security update |
![]() |
EUVD-2019-8836 | An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read. |
![]() |
USN-4460-1 | Oniguruma vulnerabilities |
![]() |
USN-5662-1 | Oniguruma vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:09:39.457Z
Reserved: 2019-11-21T00:00:00
Link: CVE-2019-19204

No data.

Status : Modified
Published: 2019-11-21T21:15:11.577
Modified: 2024-11-21T04:34:19.407
Link: CVE-2019-19204


No data.