MGASA-2020-0029

Source
https://advisories.mageia.org/MGASA-2020-0029.html
Import Source
https://advisories.mageia.org/MGASA-2020-0029.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0029
Related
Published
2020-01-11T23:52:04Z
Modified
2020-01-11T23:31:05Z
Summary
Updated oniguruma packages fix security vulnerabilities
Details

Updated oniguruma packages fix security vulnerabilities:

A use-after-free in onignewdeluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onignewdeluxe() (CVE-2019-13224).

A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression (CVE-2019-13225).

Oniguruma before 6.9.3 allows Stack Exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163).

An integer overflow in the searchinrange function in regexec.c leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression (CVE-2019-19012).

An issue was discovered in Oniguruma 6.x before 6.9.4rc2. In the function gb18030mbcenclen in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read (CVE-2019-19203).

In the function fetchrangequantifier in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read and lead to denial-of-service via a crafted regular expression (CVE-2019-19204).

Heap-based buffer over-read in strlowercase_match in regexec.c can lead to denial-of-service via a crafted regular expression (CVE-2019-19246).

References
Credits

Affected packages

Mageia:7 / oniguruma

Package

Name
oniguruma
Purl
pkg:rpm/mageia/oniguruma?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.9.4-1.mga7

Ecosystem specific

{
    "section": "core"
}