The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Oniguruma: NULL pointer dereference via match_at

Synthesis of the vulnerability 

An attacker can force a NULL pointer to be dereferenced via match_at() of Oniguruma, in order to trigger a denial of service.
Impacted products: Fedora, Solaris, RHEL.
Severity of this bulletin: 2/4.
Creation date: 31/07/2019.
Références of this threat: bulletinoct2019, CVE-2019-13225, FEDORA-2019-3f3d0953db, FEDORA-2019-5409bb5e68, RHSA-2020:3662-01, VIGILANCE-VUL-29913.

Description of the vulnerability 

An attacker can force a NULL pointer to be dereferenced via match_at() of Oniguruma, in order to trigger a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity bulletin impacts software or systems such as Fedora, Solaris, RHEL.

Our Vigil@nce team determined that the severity of this cybersecurity weakness is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this computer vulnerability bulletin.

Solutions for this threat 

Fedora: new oniguruma packages.
New packages are available:
  Fedora 29: oniguruma 6.9.1-2.fc29
  Fedora 30: oniguruma 6.9.2-2.fc30

Oracle Solaris: patch for third party software of October 2019 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

RHEL 8: new php-7.3 module.
The following module is updated:
  RHEL 8 Module: php:7.3
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a system vulnerability note. The technology watch team tracks security threats targeting the computer system.