Download
| Alert*
oval:org.secpod.oval:def:112452
oniguruma is installed oval:org.secpod.oval:def:1800378 oniguruma is installed oval:org.secpod.oval:def:118784 Oniguruma is a regular expressions library. The characteristics of this library is that different character encoding for every regular expression object can be specified oval:org.secpod.oval:def:118782 Oniguruma is a regular expressions library. The characteristics of this library is that different character encoding for every regular expression object can be specified oval:org.secpod.oval:def:504729 Oniguruma is a regular expressions library that supports a variety of character encodings. Security Fix: * oniguruma: NULL pointer dereference in match_at in regexec.c For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refe ... oval:org.secpod.oval:def:1700292 Oniguruma before 6.9.3 allows Stack Exhaustion in regcomp.c because of recursion in regparse.c. Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c. oval:org.secpod.oval:def:2500208 Oniguruma is a regular expressions library that supports a variety of character encodings. oval:org.secpod.oval:def:68012 Oniguruma is a regular expressions library that supports a variety of character encodings. Security Fix: * oniguruma: NULL pointer dereference in match_at in regexec.c For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refe ... oval:org.secpod.oval:def:1601064 A use-after-free in onig_new_deluxe in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte en ... oval:org.secpod.oval:def:89046983 This update for oniguruma fixes the following issues: - CVE-2019-19246: Fixed an out of bounds access during regular expression matching . - CVE-2019-19204: Fixed an out of bounds access when compiling a crafted regular expression . - CVE-2019-19203: Fixed an out of bounds access when performing a s ... oval:org.secpod.oval:def:3300651 SUSE Security Update: Security update for oniguruma oval:org.secpod.oval:def:1700210 A use-after-free in onig_new_deluxe in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte en ... oval:org.secpod.oval:def:509084 Oniguruma is a regular expressions library that supports a variety of character encodings. Security Fix: oniguruma: Use-after-free in onig_new_deluxe in regext.c oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c oniguruma: integer overflow in search_in_range function in r ... oval:org.secpod.oval:def:112458 Oniguruma is a regular expressions library. The characteristics of this library is that different character encoding for every regular expression object can be specified oval:org.secpod.oval:def:112451 Oniguruma is a regular expressions library. The characteristics of this library is that different character encoding for every regular expression object can be specified oval:org.secpod.oval:def:113272 Oniguruma is a regular expressions library. The characteristics of this library is that different character encoding for every regular expression object can be specified oval:org.secpod.oval:def:1800377 CVE-2017-9224: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at during regular expression searching. A logical error involving order of validation and access in match_at could r ... oval:org.secpod.oval:def:1800910 CVE-2017-9224: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at during regular expression searching. A logical error involving order of validation and access in match_at could r ... oval:org.secpod.oval:def:1701881 An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token and ... |