[Secure-testing-team] Bug#863315: libonig: CVE-2017-9227

Salvatore Bonaccorso carnil at debian.org
Thu May 25 11:42:15 UTC 2017


Source: libonig
Version: 5.9.5-3.2
Severity: important
Tags: patch upstream security
Forwarded: https://github.com/kkos/oniguruma/issues/58

Hi,

the following vulnerability was published for libonig.

CVE-2017-9227[0]:
| An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
| Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack
| out-of-bounds read occurs in mbc_enc_len() during regular expression
| searching. Invalid handling of reg->dmin in forward_search_range()
| could result in an invalid pointer dereference, as an out-of-bounds
| read from a stack buffer.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-9227
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227
[1] https://github.com/kkos/oniguruma/issues/58
[2] https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the Secure-testing-team mailing list