{"id":"CVE-2019-19204","details":"An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.","modified":"2026-04-16T04:32:48.918400566Z","published":"2019-11-21T21:15:11.577Z","related":["ALSA-2020:3662","ALSA-2024:0889","SUSE-SU-2022:3327-1","openSUSE-SU-2024:11111-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/"},{"type":"WEB","url":"https://usn.ubuntu.com/4460-1/"},{"type":"ADVISORY","url":"https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2"},{"type":"ADVISORY","url":"https://github.com/tarantula-team/CVE-2019-19204"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html"},{"type":"FIX","url":"https://github.com/kkos/oniguruma/issues/162"},{"type":"EVIDENCE","url":"https://github.com/ManhNDd/CVE-2019-19204"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kkos/oniguruma","events":[{"introduced":"83375e4d3480d6d9f6fcd6c2f99035e9522ceeae"},{"fixed":"e03900b038a274ee2f1341039e9003875c11e47d"},{"introduced":"0"},{"last_affected":"976a9bc4d2d53923223f56d1fcc9333430cb15f6"},{"fixed":"681824e81bb5fc9bbd4dfbe7a07135337129537e"}],"database_specific":{"versions":[{"introduced":"6.0.0"},{"fixed":"6.9.4"},{"introduced":"0"},{"last_affected":"6.9.4-rc1"}]}}],"versions":["v6.0.0","v6.1.0","v6.1.1","v6.1.2","v6.1.3","v6.2.0","v6.3.0","v6.4.0","v6.5.0","v6.6.0","v6.6.1","v6.7.0","v6.7.1","v6.8.0","v6.8.1","v6.8.2","v6.9.0","v6.9.1","v6.9.2","v6.9.2_rc1","v6.9.2_rc2","v6.9.2_rc3","v6.9.3","v6.9.4_rc1","v6.9.4_rc2","v6.9.4_rc3"],"database_specific":{"vanir_signatures":[{"signature_type":"Line","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["18679750778586343771741350755993589288","103368106136942227172244566078932066273","257727887412231991059145261695986113402","99731926145027407046045989165921264745","173237864390474915165548571384207574271","290228417168798604629944627181754726158","215947174697766211659352546659917433609","174440583955296606380940663435750254051","250394807291303202205505094138654332177"]},"target":{"file":"harnesses/encode-harness.c"},"deprecated":false,"id":"CVE-2019-19204-563c27e4","source":"https://github.com/kkos/oniguruma/commit/681824e81bb5fc9bbd4dfbe7a07135337129537e"},{"signature_type":"Function","digest":{"length":2816,"function_hash":"267334844810435515714121622196231420596"},"signature_version":"v1","target":{"function":"LLVMFuzzerTestOneInput","file":"harnesses/encode-harness.c"},"deprecated":false,"id":"CVE-2019-19204-718d8559","source":"https://github.com/kkos/oniguruma/commit/681824e81bb5fc9bbd4dfbe7a07135337129537e"}],"vanir_signatures_modified":"2026-04-11T09:39:44Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-19204.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}