-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : libonig Version : 5.9.1-1+deb7u1 CVE ID : CVE-2017-9224 CVE-2017-9226 CVE-2017-9227 CVE-2017-9228 CVE-2017-9229 Debian Bug : 863312 863314 863315 863316 863318
CVE-2017-9224 An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer. CVE-2017-9226 An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption. CVE-2017-9227 An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer. CVE-2017-9228 An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption. CVE-2017-9229 An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition. For Debian 7 "Wheezy", these problems have been fixed in version 5.9.1-1+deb7u1. We recommend that you upgrade your libonig packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQJ8BAEBCgBmBQJZKtS9XxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MjAxRkJGRkRCQkRFMDc4MjJFQUJCOTY5 NkZDQUMwRDM4N0I1ODQ3AAoJEJb8rA04e1hHh2wP/0QHQqwB4V34hjjHMw/WK2Ii qvlEFgIu6+GhnNA3t5A2TgoABR+OTDX3SynvViXp7K4p6k4pOGoHcplgW4E7bT66 5I255ibdX6xOBTd3wiXgh+iD/cqRfltCBJNzw9zw0g0h3W9+HUqejzxwj1ofl84T G6TnAn0erxf5WXozK6uCvRIb60OCKOLh2qiwK3H45oxeqmhdgmBG6Er8mPbQZVDW ZbbpO1Um5/r2grT0WaT/3KA0s3PZwbFFs7fn6w2HANatJxmNnhfoGH5KOhZGGamE uOKpIg10ncdPuDDkanfd0YoykspaOzYvw1o22t8q8yQnjtL9hrjmsxYOphVUGlR9 GIxJfkz5iRvSm6OAoyVJfA07t8AhUq14MY/GvzuAFke8chACk1hJ8sWP6H67M8OP skfVa12f4snBTFZ1Z0vPPSy6HafOYu0sWDosHgJ3RG5+h+UCKWqGd2srGNO/3Jmz uM19gjdt8mk7yjwXWYQNh5l1h9VUOoUxFRYh1Wqt4p1PSjt1M9R5OBn33KkcZK4v qvMGEyzRHe6PpG5FqbOu/xM+mbIxj8IXjVYQqzhdZKFf8zm4G362VASb2lcsYX23 BgDfJ7O1EpJ9R+MVaQQ/kOKaFn5yWsKkQfnw/nhf/3TeN7+ebS7NFv6XRwkQiARy +l8l6UyEOXfxytjiWRH/ =ouxY -----END PGP SIGNATURE-----