Description
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2020-1 | libonig security update |
Debian DLA |
DLA-2431-1 | [SECURITY][DLA 2431-1] libonig security update |
EUVD |
EUVD-2019-8836 | An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read. |
Ubuntu USN |
USN-4460-1 | Oniguruma vulnerabilities |
Ubuntu USN |
USN-5662-1 | Oniguruma vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:09:39.457Z
Reserved: 2019-11-21T00:00:00.000Z
Link: CVE-2019-19204
No data.
Status : Modified
Published: 2019-11-21T21:15:11.577
Modified: 2024-11-21T04:34:19.407
Link: CVE-2019-19204
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN