CVE-2017-9224

Priority
Description
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds
read occurs in match_at() during regular expression searching. A logical
error involving order of validation and access in match_at() could result
in an out-of-bounds read from a stack buffer.
Ubuntu-Description
It was discovered that Oniguruma incorrectly handled certain regular
expressions. An attacker could possibly use this issue to obtain
sensitive information, cause a denial of service or execute arbitrary
code.
Notes
Package
Upstream:needs-triage
Ubuntu 18.04 LTS:released (6.3.0-1)
Ubuntu 14.04 ESM:released (5.9.1-1ubuntu1.1)
Patches:
Upstream:https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b
Package
Source: php5 (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:released (5.5.9+dfsg-1ubuntu4.22)
Patches:
Upstream:https://github.com/php/php-src/commit/2693e52113ea0369144073e84d568931ffc173a7
Package
Upstream:needs-triage
Ubuntu 18.04 LTS:DNE
Ubuntu 16.04 ESM:released (7.0.22-0ubuntu0.16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Upstream:https://github.com/php/php-src/commit/60b1829e1cd18facc696264fd830c4bbd593cfa9
Package
Upstream:needs-triage
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Upstream:https://github.com/php/php-src/commit/60b1829e1cd18facc696264fd830c4bbd593cfa9
More Information

Updated: 2022-04-13 13:05:27 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)