CVE-2017-9227

Priority
Description
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds
read occurs in mbc_enc_len() during regular expression searching. Invalid
handling of reg->dmin in forward_search_range() could result in an invalid
pointer dereference, as an out-of-bounds read from a stack buffer.
Ubuntu-Description
It was discovered that Oniguruma incorrectly handled certain regular
expressions. An attacker could possibly use this issue to obtain
sensitive information, cause a denial of service or execute arbitrary
code.
Notes
Package
Upstream:needs-triage
Ubuntu 18.04 LTS:released (6.3.0-1)
Ubuntu 14.04 ESM:released (5.9.1-1ubuntu1.1)
Patches:
Upstream:https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814
Package
Source: php5 (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:released (5.5.9+dfsg-1ubuntu4.22)
Patches:
Upstream:https://github.com/php/php-src/commit/bdf7393ddb15d0ac522250a9825b685437e2b966
Package
Upstream:needs-triage
Ubuntu 18.04 LTS:DNE
Ubuntu 16.04 ESM:released (7.0.22-0ubuntu0.16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Upstream:https://github.com/php/php-src/commit/6a8ae7cf8db3ec8dabfd027e01cdbcbb52654c90
Package
Upstream:needs-triage
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Upstream:https://github.com/php/php-src/commit/6a8ae7cf8db3ec8dabfd027e01cdbcbb52654c90
More Information

Updated: 2022-04-13 13:05:28 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)