{"id":"CVE-2019-19012","details":"An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.","modified":"2026-04-16T04:39:48.843164481Z","published":"2019-11-17T18:15:11.440Z","related":["ALSA-2024:0889","ALSA-2025:7539","openSUSE-SU-2024:11111-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/"},{"type":"WEB","url":"https://usn.ubuntu.com/4460-1/"},{"type":"ADVISORY","url":"https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html"},{"type":"FIX","url":"https://github.com/kkos/oniguruma/issues/164"},{"type":"EVIDENCE","url":"https://github.com/tarantula-team/CVE-2019-19012"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kkos/oniguruma","events":[{"introduced":"83375e4d3480d6d9f6fcd6c2f99035e9522ceeae"},{"last_affected":"813592905c2d55ff7f70fc92bf775c859d6ed48e"},{"introduced":"0"},{"last_affected":"976a9bc4d2d53923223f56d1fcc9333430cb15f6"},{"fixed":"681824e81bb5fc9bbd4dfbe7a07135337129537e"}],"database_specific":{"versions":[{"introduced":"6.0.0"},{"last_affected":"6.9.3"},{"introduced":"0"},{"last_affected":"6.9.4-rc1"}]}}],"versions":["v6.0.0","v6.1.0","v6.1.1","v6.1.2","v6.1.3","v6.2.0","v6.3.0","v6.4.0","v6.5.0","v6.6.0","v6.6.1","v6.7.0","v6.7.1","v6.8.0","v6.8.1","v6.8.2","v6.9.0","v6.9.1","v6.9.2","v6.9.2_rc1","v6.9.2_rc2","v6.9.2_rc3","v6.9.3","v6.9.4_rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-19012.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}],"vanir_signatures_modified":"2026-04-11T09:39:42Z","vanir_signatures":[{"signature_type":"Line","deprecated":false,"target":{"file":"harnesses/encode-harness.c"},"digest":{"line_hashes":["18679750778586343771741350755993589288","103368106136942227172244566078932066273","257727887412231991059145261695986113402","99731926145027407046045989165921264745","173237864390474915165548571384207574271","290228417168798604629944627181754726158","215947174697766211659352546659917433609","174440583955296606380940663435750254051","250394807291303202205505094138654332177"],"threshold":0.9},"id":"CVE-2019-19012-563c27e4","signature_version":"v1","source":"https://github.com/kkos/oniguruma/commit/681824e81bb5fc9bbd4dfbe7a07135337129537e"},{"source":"https://github.com/kkos/oniguruma/commit/681824e81bb5fc9bbd4dfbe7a07135337129537e","deprecated":false,"target":{"file":"harnesses/encode-harness.c","function":"LLVMFuzzerTestOneInput"},"digest":{"function_hash":"267334844810435515714121622196231420596","length":2816},"id":"CVE-2019-19012-718d8559","signature_version":"v1","signature_type":"Function"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}