Total vulnerabilities in the database
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
Software | From | Fixed in |
---|---|---|
oniguruma_project / oniguruma | 6.9.2 | 6.9.2.x |
php / php | 7.3.0 | 7.3.9 |
php / php | 7.2.0 | 7.2.23 |
php / php | 7.1.0 | 7.1.32 |
fedoraproject / fedora | 29 | 29.x |
fedoraproject / fedora | 30 | 30.x |
debian / debian_linux | 8.0 | 8.0.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |