CVE-2019-19012

CVE Details

Release Date:2019-11-17
Impact:Moderate What is this?

Description


An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.

See more information about CVE-2019-19012 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 7.5
Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: None
Scope: Unchanged
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 8 (oniguruma)ELSA-2024-08892024-02-20
Oracle Linux version 8 (ruby)ELSA-2025-75392025-05-16
Oracle Linux version 8 (rubygem-abrt)ELSA-2025-75392025-05-16
Oracle Linux version 8 (rubygem-bson)ELSA-2025-75392025-05-16
Oracle Linux version 8 (rubygem-bundler)ELSA-2025-75392025-05-16
Oracle Linux version 8 (rubygem-mongo)ELSA-2025-75392025-05-16
Oracle Linux version 8 (rubygem-mysql2)ELSA-2025-75392025-05-16
Oracle Linux version 8 (rubygem-pg)ELSA-2025-75392025-05-16


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete