Description
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2020-1 | libonig security update |
Debian DLA |
DLA-2431-1 | [SECURITY][DLA 2431-1] libonig security update |
Ubuntu USN |
USN-4460-1 | Oniguruma vulnerabilities |
Ubuntu USN |
USN-5662-1 | Oniguruma vulnerabilities |
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:02:39.918Z
Reserved: 2019-11-16T00:00:00.000Z
Link: CVE-2019-19012
No data.
Status : Modified
Published: 2019-11-17T18:15:11.440
Modified: 2024-11-21T04:33:59.490
Link: CVE-2019-19012
OpenCVE Enrichment
No data.
Debian DLA
Ubuntu USN