FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

oniguruma -- multiple vulnerabilities

Affected packages
oniguruma < 6.9.3

Details

VuXML ID a8d87c7a-d1b1-11e9-a616-0992a4564e7c
Discovery 2019-07-03
Entry 2019-09-07

A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe().

A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression.

Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.

References

CVE Name CVE-2019-13224
CVE Name CVE-2019-13225
URL https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224
URL https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13225
URL https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
URL https://github.com/kkos/oniguruma/commit/c509265c5f6ae7264f7b8a8aae1cfa5fc59d108c