Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:0572 - Security Advisory
Issued:
2024-01-30
Updated:
2024-01-30

RHSA-2024:0572 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: oniguruma security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for oniguruma is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Oniguruma is a regular expressions library that supports a variety of character encodings.

Security Fix(es):

  • oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224)
  • oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163)
  • oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read (CVE-2019-19012)
  • oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203)
  • oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.8 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.8 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.8 ppc64le
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.8 s390x
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.8 aarch64

Fixes

  • BZ - 1728970 - CVE-2019-13224 oniguruma: Use-after-free in onig_new_deluxe() in regext.c
  • BZ - 1768997 - CVE-2019-16163 oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c
  • BZ - 1802051 - CVE-2019-19012 oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read
  • BZ - 1802061 - CVE-2019-19203 oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c
  • BZ - 1802068 - CVE-2019-19204 oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c

CVEs

  • CVE-2019-13224
  • CVE-2019-16163
  • CVE-2019-19012
  • CVE-2019-19203
  • CVE-2019-19204

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8

SRPM
oniguruma-6.8.2-2.1.el8_8.src.rpm SHA-256: 3012fc1a95535ba08228353eeef2c50bbdd10c0f31936b0212f30d9c27972f8f
x86_64
oniguruma-6.8.2-2.1.el8_8.i686.rpm SHA-256: b46b7d7fb161114e37a0a63f15a841735831c78db2fd0488ab46beceb656d0f3
oniguruma-6.8.2-2.1.el8_8.x86_64.rpm SHA-256: 259237aeb65cc4292099440afdd1e54335571978777b4a0d5c84e22e4291c0de
oniguruma-debuginfo-6.8.2-2.1.el8_8.i686.rpm SHA-256: 9eb4f6166478cf099e52709f31689f8b7adbd37bb092132636715092fc95c7b5
oniguruma-debuginfo-6.8.2-2.1.el8_8.x86_64.rpm SHA-256: 09912009f50b33fcc3ab5bc08c4aa4a9b25779d77bc6706b974c79dd31532b8e
oniguruma-debugsource-6.8.2-2.1.el8_8.i686.rpm SHA-256: bb5d7caabcf256317443a09faaaf9037149300704a8538641cce0715471a5dcd
oniguruma-debugsource-6.8.2-2.1.el8_8.x86_64.rpm SHA-256: 7f65cd9121afbc959ecbade8d79381367ac47e89f6724d5b40c5e305d91fd204

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8

SRPM
oniguruma-6.8.2-2.1.el8_8.src.rpm SHA-256: 3012fc1a95535ba08228353eeef2c50bbdd10c0f31936b0212f30d9c27972f8f
s390x
oniguruma-6.8.2-2.1.el8_8.s390x.rpm SHA-256: 8c0d5ae49be7bc84c7e21c04f8b386bd1dc5e8260a3018555dce42de01027f9d
oniguruma-debuginfo-6.8.2-2.1.el8_8.s390x.rpm SHA-256: d6610be7ff6f8dc45748cda54e6f5757a442768240f4f31494acfc3e752656e9
oniguruma-debugsource-6.8.2-2.1.el8_8.s390x.rpm SHA-256: 72792c7e152e8b5c398cbfb3052d217bb33aa1364e5c07c8d1477272bd6c6958

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8

SRPM
oniguruma-6.8.2-2.1.el8_8.src.rpm SHA-256: 3012fc1a95535ba08228353eeef2c50bbdd10c0f31936b0212f30d9c27972f8f
ppc64le
oniguruma-6.8.2-2.1.el8_8.ppc64le.rpm SHA-256: 3d0b3858b3a02baeb7ebf7ea7375e6ae8d76dcb02826361a21fdc7407f5beaaa
oniguruma-debuginfo-6.8.2-2.1.el8_8.ppc64le.rpm SHA-256: d4aebdafb1124c9aba74a4f35fd0a3b76f9b179b1a9a7a7f680f8d75604519ee
oniguruma-debugsource-6.8.2-2.1.el8_8.ppc64le.rpm SHA-256: 5088b31d551ea4757e39d004e2d08ab7328b95521fb30499b22d8f5bd1e473c6

Red Hat Enterprise Linux Server - TUS 8.8

SRPM
oniguruma-6.8.2-2.1.el8_8.src.rpm SHA-256: 3012fc1a95535ba08228353eeef2c50bbdd10c0f31936b0212f30d9c27972f8f
x86_64
oniguruma-6.8.2-2.1.el8_8.i686.rpm SHA-256: b46b7d7fb161114e37a0a63f15a841735831c78db2fd0488ab46beceb656d0f3
oniguruma-6.8.2-2.1.el8_8.x86_64.rpm SHA-256: 259237aeb65cc4292099440afdd1e54335571978777b4a0d5c84e22e4291c0de
oniguruma-debuginfo-6.8.2-2.1.el8_8.i686.rpm SHA-256: 9eb4f6166478cf099e52709f31689f8b7adbd37bb092132636715092fc95c7b5
oniguruma-debuginfo-6.8.2-2.1.el8_8.x86_64.rpm SHA-256: 09912009f50b33fcc3ab5bc08c4aa4a9b25779d77bc6706b974c79dd31532b8e
oniguruma-debugsource-6.8.2-2.1.el8_8.i686.rpm SHA-256: bb5d7caabcf256317443a09faaaf9037149300704a8538641cce0715471a5dcd
oniguruma-debugsource-6.8.2-2.1.el8_8.x86_64.rpm SHA-256: 7f65cd9121afbc959ecbade8d79381367ac47e89f6724d5b40c5e305d91fd204

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8

SRPM
oniguruma-6.8.2-2.1.el8_8.src.rpm SHA-256: 3012fc1a95535ba08228353eeef2c50bbdd10c0f31936b0212f30d9c27972f8f
aarch64
oniguruma-6.8.2-2.1.el8_8.aarch64.rpm SHA-256: eae290f05193a32b0e9313704a9c8c4ff6a05d147fb64a178a48ffe68eeef187
oniguruma-debuginfo-6.8.2-2.1.el8_8.aarch64.rpm SHA-256: 021ffb5174a86e20504945f2c148d40ed3dacbb7cc67f3f238ea85bbb3b7b9e3
oniguruma-debugsource-6.8.2-2.1.el8_8.aarch64.rpm SHA-256: 860fbcf806997fac63be4384d7e83d61087606cdd38b604e34f398be730e55b2

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8

SRPM
oniguruma-6.8.2-2.1.el8_8.src.rpm SHA-256: 3012fc1a95535ba08228353eeef2c50bbdd10c0f31936b0212f30d9c27972f8f
ppc64le
oniguruma-6.8.2-2.1.el8_8.ppc64le.rpm SHA-256: 3d0b3858b3a02baeb7ebf7ea7375e6ae8d76dcb02826361a21fdc7407f5beaaa
oniguruma-debuginfo-6.8.2-2.1.el8_8.ppc64le.rpm SHA-256: d4aebdafb1124c9aba74a4f35fd0a3b76f9b179b1a9a7a7f680f8d75604519ee
oniguruma-debugsource-6.8.2-2.1.el8_8.ppc64le.rpm SHA-256: 5088b31d551ea4757e39d004e2d08ab7328b95521fb30499b22d8f5bd1e473c6

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8

SRPM
oniguruma-6.8.2-2.1.el8_8.src.rpm SHA-256: 3012fc1a95535ba08228353eeef2c50bbdd10c0f31936b0212f30d9c27972f8f
x86_64
oniguruma-6.8.2-2.1.el8_8.i686.rpm SHA-256: b46b7d7fb161114e37a0a63f15a841735831c78db2fd0488ab46beceb656d0f3
oniguruma-6.8.2-2.1.el8_8.x86_64.rpm SHA-256: 259237aeb65cc4292099440afdd1e54335571978777b4a0d5c84e22e4291c0de
oniguruma-debuginfo-6.8.2-2.1.el8_8.i686.rpm SHA-256: 9eb4f6166478cf099e52709f31689f8b7adbd37bb092132636715092fc95c7b5
oniguruma-debuginfo-6.8.2-2.1.el8_8.x86_64.rpm SHA-256: 09912009f50b33fcc3ab5bc08c4aa4a9b25779d77bc6706b974c79dd31532b8e
oniguruma-debugsource-6.8.2-2.1.el8_8.i686.rpm SHA-256: bb5d7caabcf256317443a09faaaf9037149300704a8538641cce0715471a5dcd
oniguruma-debugsource-6.8.2-2.1.el8_8.x86_64.rpm SHA-256: 7f65cd9121afbc959ecbade8d79381367ac47e89f6724d5b40c5e305d91fd204

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.8

SRPM
x86_64
oniguruma-debuginfo-6.8.2-2.1.el8_8.i686.rpm SHA-256: 9eb4f6166478cf099e52709f31689f8b7adbd37bb092132636715092fc95c7b5
oniguruma-debuginfo-6.8.2-2.1.el8_8.x86_64.rpm SHA-256: 09912009f50b33fcc3ab5bc08c4aa4a9b25779d77bc6706b974c79dd31532b8e
oniguruma-debugsource-6.8.2-2.1.el8_8.i686.rpm SHA-256: bb5d7caabcf256317443a09faaaf9037149300704a8538641cce0715471a5dcd
oniguruma-debugsource-6.8.2-2.1.el8_8.x86_64.rpm SHA-256: 7f65cd9121afbc959ecbade8d79381367ac47e89f6724d5b40c5e305d91fd204
oniguruma-devel-6.8.2-2.1.el8_8.i686.rpm SHA-256: de8b8ecde1b9ec3fd6bf51b4c6a7c103d167e803d5d6be193612be1705003379
oniguruma-devel-6.8.2-2.1.el8_8.x86_64.rpm SHA-256: 5816b19e198f9ef6d5b60f4548ceb25d0450e9d4ac06aff7de706c23aa27fbf0

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.8

SRPM
ppc64le
oniguruma-debuginfo-6.8.2-2.1.el8_8.ppc64le.rpm SHA-256: d4aebdafb1124c9aba74a4f35fd0a3b76f9b179b1a9a7a7f680f8d75604519ee
oniguruma-debugsource-6.8.2-2.1.el8_8.ppc64le.rpm SHA-256: 5088b31d551ea4757e39d004e2d08ab7328b95521fb30499b22d8f5bd1e473c6
oniguruma-devel-6.8.2-2.1.el8_8.ppc64le.rpm SHA-256: 2d61d2ad47ba2be69259816c0ba6ea7042dd3c013df3a25759ee1fd346b25eb6

Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.8

SRPM
s390x
oniguruma-debuginfo-6.8.2-2.1.el8_8.s390x.rpm SHA-256: d6610be7ff6f8dc45748cda54e6f5757a442768240f4f31494acfc3e752656e9
oniguruma-debugsource-6.8.2-2.1.el8_8.s390x.rpm SHA-256: 72792c7e152e8b5c398cbfb3052d217bb33aa1364e5c07c8d1477272bd6c6958
oniguruma-devel-6.8.2-2.1.el8_8.s390x.rpm SHA-256: f0ba1919cdb2f00b5e6f04f756a4c88deee698a2227d0fe8aec594e59b385130

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.8

SRPM
aarch64
oniguruma-debuginfo-6.8.2-2.1.el8_8.aarch64.rpm SHA-256: 021ffb5174a86e20504945f2c148d40ed3dacbb7cc67f3f238ea85bbb3b7b9e3
oniguruma-debugsource-6.8.2-2.1.el8_8.aarch64.rpm SHA-256: 860fbcf806997fac63be4384d7e83d61087606cdd38b604e34f398be730e55b2
oniguruma-devel-6.8.2-2.1.el8_8.aarch64.rpm SHA-256: bf0326d03bd3cc787d55e5ae627b6f02c7b3d43729262e3044d70ebf47ef9aa4

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility