[Secure-testing-team] Bug#863314: libonig: CVE-2017-9226

Salvatore Bonaccorso carnil at debian.org
Thu May 25 11:40:34 UTC 2017


Source: libonig
Version: 5.9.5-3.2
Severity: important
Tags: upstream patch security
Forwarded: https://github.com/kkos/oniguruma/issues/55

Hi,

the following vulnerability was published for libonig.

CVE-2017-9226[0]:
| An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
| Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap
| out-of-bounds write or read occurs in next_state_val() during regular
| expression compilation. Octal numbers larger than 0xff are not handled
| correctly in fetch_token() and fetch_token_in_cc(). A malformed regular
| expression containing an octal number in the form of '\700' would
| produce an invalid code point value larger than 0xff in
| next_state_val(), resulting in an out-of-bounds write memory
| corruption.

>From quick check of the code this seem to affect as well back the
version in jessie, but please double-check.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-9226
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226
[1] https://github.com/kkos/oniguruma/issues/55
[2] https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
[3] https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the Secure-testing-team mailing list