CVE-2019-13224

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-13224
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-13224.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-13224
Downstream
Related
Published
2019-07-10T14:15:11Z
Modified
2025-10-18T09:10:55.633541Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A use-after-free in onignewdeluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onignewdeluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.

References

Affected packages

Git / github.com/kkos/oniguruma

Affected ranges

Type
GIT
Repo
https://github.com/kkos/oniguruma
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v5.*

v5.9.6

v6.*

v6.0.0
v6.1.0
v6.1.1
v6.1.2
v6.1.3
v6.2.0
v6.3.0
v6.4.0
v6.5.0
v6.6.0
v6.6.1
v6.7.0
v6.7.1
v6.8.0
v6.8.1
v6.8.2
v6.9.0
v6.9.1
v6.9.2
v6.9.2_rc1
v6.9.2_rc2
v6.9.2_rc3

Database specific

vanir_signatures

[
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "144477375847041035196488014531602342496",
                "39487835141121000899975727629951651164",
                "243574904145470851950892010676215846309",
                "261101043450223522914619713906777460104",
                "192845130568107495712244117068883375560",
                "38824287918157113434026198298701563168",
                "44502028448723226475273193052058068900",
                "57330471737783644434537330796049609549",
                "265399586591815778503620908494229098639",
                "17751534671408493758106039438651136950",
                "42363307028960740653651765099861536532"
            ]
        },
        "id": "CVE-2019-13224-69a60e05",
        "target": {
            "file": "src/regext.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55",
        "signature_type": "Line"
    },
    {
        "digest": {
            "function_hash": "16716532786252836573114105484968648519",
            "length": 884.0
        },
        "id": "CVE-2019-13224-b47700ae",
        "target": {
            "function": "onig_new_deluxe",
            "file": "src/regext.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55",
        "signature_type": "Function"
    }
]

Git / github.com/kkos/oniguruma

Affected ranges

Type
GIT
Repo
https://github.com/php/php-src
Events