CVE-2019-13224

A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
Configurations

Configuration 1 (hide)

cpe:2.3:a:oniguruma_project:oniguruma:6.9.2:-:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

History

07 Nov 2023, 03:03

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/', 'name': 'FEDORA-2019-5409bb5e68', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://support.f5.com/csp/article/K00103182?utm_source=f5support&utm_medium=RSS', 'name': 'https://support.f5.com/csp/article/K00103182?utm_source=f5support&utm_medium=RSS', 'tags': ['Third Party Advisory'], 'refsource': 'CONFIRM'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/', 'name': 'FEDORA-2019-3f3d0953db', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/ -
  • () https://support.f5.com/csp/article/K00103182?utm_source=f5support&amp%3Butm_medium=RSS -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/ -

20 Jul 2022, 16:33

Type Values Removed Values Added
References (UBUNTU) https://usn.ubuntu.com/4088-1/ - (UBUNTU) https://usn.ubuntu.com/4088-1/ - Third Party Advisory
References (CONFIRM) https://support.f5.com/csp/article/K00103182?utm_source=f5support&utm_medium=RSS - (CONFIRM) https://support.f5.com/csp/article/K00103182?utm_source=f5support&utm_medium=RSS - Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/201911-03 - (GENTOO) https://security.gentoo.org/glsa/201911-03 - Third Party Advisory
References (CONFIRM) https://support.f5.com/csp/article/K00103182 - (CONFIRM) https://support.f5.com/csp/article/K00103182 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/07/msg00013.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/07/msg00013.html - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/ - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/ - Mailing List, Third Party Advisory
CPE cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
First Time Fedoraproject
Fedoraproject fedora
Php
Debian
Canonical ubuntu Linux
Canonical
Debian debian Linux
Php php

Information

Published : 2019-07-10 14:15

Updated : 2023-12-10 12:59


NVD link : CVE-2019-13224

Mitre link : CVE-2019-13224

CVE.ORG link : CVE-2019-13224


JSON object : View

Products Affected

oniguruma_project

  • oniguruma

canonical

  • ubuntu_linux

php

  • php

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-416

Use After Free