First published: Tue Aug 13 2019(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php73-php | <0:7.3.20-1.el7 | 0:7.3.20-1.el7 |
Oniguruma Project Oniguruma | <=6.9.3 | |
PHP PHP | >=7.3.0<7.3.10 | |
Fedoraproject Fedora | =31 | |
Canonical Ubuntu Linux | =14.04 | |
Debian Debian Linux | =8.0 | |
redhat/oniguruma | <6.9.4 | 6.9.4 |
debian/libonig | 6.9.6-1.1 6.9.8-1 6.9.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19246 is a vulnerability that exists in Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, which allows for a heap-based buffer over-read.
CVE-2019-19246 affects PHP 7.3.x by causing a heap-based buffer over-read in the str_lower_case_match function in regexec.c.
CVE-2019-19246 has a severity rating of 7.5 (high).
To fix CVE-2019-19246, upgrade to Oniguruma version 6.9.4 or above.
You can find more information about CVE-2019-19246 at the following references: [1] [2] [3].