Description: "In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c."
Turned out to not be an issue: https://github.com/kkos/oniguruma/issues/221#issuecomment-712814784