[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 958-1] libonig security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : libonig
Version        : 5.9.1-1+deb7u1
CVE ID         : CVE-2017-9224 CVE-2017-9226 CVE-2017-9227 CVE-2017-9228
                 CVE-2017-9229
Debian Bug     : 863312 863314 863315 863316 863318

CVE-2017-9224

    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
    Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack
    out-of-bounds read occurs in match_at() during regular expression
    searching. A logical error involving order of validation and access in
    match_at() could result in an out-of-bounds read from a stack buffer.

CVE-2017-9226

    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
    Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap
    out-of-bounds write or read occurs in next_state_val() during regular
    expression compilation. Octal numbers larger than 0xff are not handled
    correctly in fetch_token() and fetch_token_in_cc(). A malformed regular
    expression containing an octal number in the form of '\700' would
    produce an invalid code point value larger than 0xff in
    next_state_val(), resulting in an out-of-bounds write memory
    corruption.

CVE-2017-9227

    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
    Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack
    out-of-bounds read occurs in mbc_enc_len() during regular expression
    searching. Invalid handling of reg->dmin in forward_search_range()
    could result in an invalid pointer dereference, as an out-of-bounds
    read from a stack buffer.

CVE-2017-9228

    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
    Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap
    out-of-bounds write occurs in bitset_set_range() during regular
    expression compilation due to an uninitialized variable from an
    incorrect state transition. An incorrect state transition in
    parse_char_class() could create an execution path that leaves a
    critical local variable uninitialized until it's used as an index,
    resulting in an out-of-bounds write memory corruption.

CVE-2017-9229

    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
    Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs
    in left_adjust_char_head() during regular expression compilation.
    Invalid handling of reg->dmax in forward_search_range() could result in
    an invalid pointer dereference, normally as an immediate
    denial-of-service condition.



For Debian 7 "Wheezy", these problems have been fixed in version
5.9.1-1+deb7u1.

We recommend that you upgrade your libonig packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=ouxY
-----END PGP SIGNATURE-----


Reply to: