| Name | CVE-2019-13225 |
| Description | A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression. Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 931878 |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| libonig (PTS) | bullseye | 6.9.6-1.1 | fixed |
| bookworm | 6.9.8-1 | fixed |
| trixie | 6.9.9-1 | fixed |
| forky, sid | 6.9.10-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|
| libonig | source | jessie | (not affected) | | | |
| libonig | source | stretch | (not affected) | | | |
| libonig | source | (unstable) | 6.9.2-1 | low | | 931878 |
Notes
[buster] - libonig <no-dsa> (Minor issue)
[stretch] - libonig <not-affected> (vulnerable code was introduced later)
[jessie] - libonig <not-affected> (vulnerable code was introduced later)
https://github.com/kkos/oniguruma/commit/c509265c5f6ae7264f7b8a8aae1cfa5fc59d108c