A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-07-10T13:50:57

Updated: 2019-11-07T20:06:33

Reserved: 2019-07-03T00:00:00


Link: CVE-2019-13224

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2019-07-10T14:15:11.607

Modified: 2023-11-07T03:03:48.107


Link: CVE-2019-13224

JSON object: View

cve-icon Redhat Information

No data.

CWE