CVE-2019-13224

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-13224
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-13224.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-13224
Downstream
Related
Published
2019-07-10T14:15:11Z
Modified
2025-09-19T10:35:50.293730Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A use-after-free in onignewdeluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onignewdeluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.

References

Affected packages

Git / github.com/kkos/oniguruma

Affected ranges

Type
GIT
Repo
https://github.com/kkos/oniguruma
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/php/php-src
Events

Affected versions

v5.*

v5.9.6

v6.*

v6.0.0
v6.1.0
v6.1.1
v6.1.2
v6.1.3
v6.2.0
v6.3.0
v6.4.0
v6.5.0
v6.6.0
v6.6.1
v6.7.0
v6.7.1
v6.8.0
v6.8.1
v6.8.2
v6.9.0
v6.9.1
v6.9.2
v6.9.2_rc1
v6.9.2_rc2
v6.9.2_rc3

Database specific

{
    "vanir_signatures": [
        {
            "deprecated": false,
            "source": "https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55",
            "target": {
                "file": "src/regext.c"
            },
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "144477375847041035196488014531602342496",
                    "39487835141121000899975727629951651164",
                    "243574904145470851950892010676215846309",
                    "261101043450223522914619713906777460104",
                    "192845130568107495712244117068883375560",
                    "38824287918157113434026198298701563168",
                    "44502028448723226475273193052058068900",
                    "57330471737783644434537330796049609549",
                    "265399586591815778503620908494229098639",
                    "17751534671408493758106039438651136950",
                    "42363307028960740653651765099861536532"
                ]
            },
            "id": "CVE-2019-13224-69a60e05",
            "signature_version": "v1",
            "signature_type": "Line"
        },
        {
            "deprecated": false,
            "source": "https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55",
            "target": {
                "function": "onig_new_deluxe",
                "file": "src/regext.c"
            },
            "digest": {
                "function_hash": "16716532786252836573114105484968648519",
                "length": 884.0
            },
            "id": "CVE-2019-13224-b47700ae",
            "signature_version": "v1",
            "signature_type": "Function"
        }
    ]
}