First published: Mon May 22 2017(Updated: )
Add oniguruma upstream fix (CVE-2017-9224, CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php70-php | <0:7.0.27-1.el6 | 0:7.0.27-1.el6 |
redhat/rh-php70-php | <0:7.0.27-1.el7 | 0:7.0.27-1.el7 |
Oniguruma Project Oniguruma | =6.2.0 | |
PHP PHP | <5.6.31 | |
PHP PHP | >=7.0.0<7.0.21 | |
PHP PHP | >=7.1.0<7.1.7 | |
PHP PHP | <7.0.21 | 7.0.21 |
redhat/oniguruma | <6.3.0 | 6.3.0 |
redhat/php | <5.6.31 | 5.6.31 |
redhat/php | <7.0.21 | 7.0.21 |
redhat/php | <7.1.7 | 7.1.7 |
debian/libonig | 6.9.6-1.1 6.9.8-1 6.9.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-9224 is critical with a score of 9.8.
The affected software for CVE-2017-9224 includes Oniguruma 6.2.0, Ruby through 2.4.1, and PHP through 7.1.5.
To fix CVE-2017-9224 in Oniguruma, update to version 6.3.0.
To fix CVE-2017-9224 in PHP, update to version 7.0.21 or 7.1.7.
You can find more information about CVE-2017-9224 at the following references: [Reference 1](https://github.com/kkos/oniguruma/issues/57), [Reference 2](https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1466750).