{"id":"CVE-2019-13224","details":"A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.","modified":"2026-04-16T01:40:24.334807587Z","published":"2019-07-10T14:15:11.607Z","related":["ALSA-2020:3662","ALSA-2024:0889","SUSE-SU-2022:3327-1","openSUSE-SU-2024:11111-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/"},{"type":"WEB","url":"https://support.f5.com/csp/article/K00103182?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"ADVISORY","url":"https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/07/msg00013.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201911-03"},{"type":"ADVISORY","url":"https://support.f5.com/csp/article/K00103182"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4088-1/"},{"type":"FIX","url":"https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2019/07/msg00013.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kkos/oniguruma","events":[{"introduced":"0"},{"fixed":"0f7f61ed1b7b697e283e37bd2d731d0bd57adb55"}]}],"versions":["v5.9.6","v6.0.0","v6.1.0","v6.1.1","v6.1.2","v6.1.3","v6.2.0","v6.3.0","v6.4.0","v6.5.0","v6.6.0","v6.6.1","v6.7.0","v6.7.1","v6.8.0","v6.8.1","v6.8.2","v6.9.0","v6.9.1","v6.9.2","v6.9.2_rc1","v6.9.2_rc2","v6.9.2_rc3"],"database_specific":{"vanir_signatures":[{"signature_version":"v1","target":{"file":"src/regext.c"},"source":"https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55","deprecated":false,"id":"CVE-2019-13224-69a60e05","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["144477375847041035196488014531602342496","39487835141121000899975727629951651164","243574904145470851950892010676215846309","261101043450223522914619713906777460104","192845130568107495712244117068883375560","38824287918157113434026198298701563168","44502028448723226475273193052058068900","57330471737783644434537330796049609549","265399586591815778503620908494229098639","17751534671408493758106039438651136950","42363307028960740653651765099861536532"]}},{"signature_version":"v1","signature_type":"Function","id":"CVE-2019-13224-b47700ae","deprecated":false,"source":"https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55","target":{"file":"src/regext.c","function":"onig_new_deluxe"},"digest":{"function_hash":"16716532786252836573114105484968648519","length":884}}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-13224.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}