oniguruma: Buffer overflow in concat_opt_exact_str could result in DoS (CVE-2020-26159)
In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c .
References:
Patch:
https://github.com/kkos/oniguruma/commit/cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0
Affected branches:
-
master -
3.12-stable -
3.11-stable -
3.10-stable -
3.9-stable
Edited by Leo