CVE-2019-13225

NameCVE-2019-13225
DescriptionA NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression. Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs931878

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libonig (PTS)jessie, jessie (lts)5.9.5-3.2+deb8u6fixed
stretch (security), stretch (lts), stretch6.1.3-2+deb9u2fixed
buster6.9.1-1vulnerable
bullseye6.9.6-1.1fixed
bookworm6.9.8-1fixed
sid, trixie6.9.9-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libonigsourcewheezy(not affected)
libonigsourcejessie(not affected)
libonigsourcestretch(not affected)
libonigsource(unstable)6.9.2-1low931878

Notes

[buster] - libonig <no-dsa> (Minor issue)
[stretch] - libonig <not-affected> (vulnerable code was introduced later)
[jessie] - libonig <not-affected> (vulnerable code was introduced later)
https://github.com/kkos/oniguruma/commit/c509265c5f6ae7264f7b8a8aae1cfa5fc59d108c
[wheezy] - libonig <not-affected> (vulnerable code was introduced later)

Search for package or bug name: Reporting problems