Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jcjp-j466-5xxg

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c .

In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c .

Дефекты

CWE-787

Связанные уязвимости

ubuntu
больше 5 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none

CVSS3: 8.6
redhat
больше 5 лет назад

A flaw was found in oniguruma. An attacker, able to supply a regular expression for compilation, may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c .

nvd
больше 5 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none

msrc
4 месяца назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none

suse-cvrf
больше 1 года назад

Security update for oniguruma

Дефекты

CWE-787