First published: Thu May 18 2017(Updated: )
Add oniguruma upstream fix (CVE-2017-9224, CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php70-php | <0:7.0.27-1.el6 | 0:7.0.27-1.el6 |
redhat/rh-php70-php | <0:7.0.27-1.el7 | 0:7.0.27-1.el7 |
Oniguruma Project Oniguruma | =6.2.0 | |
PHP PHP | <5.6.31 | |
PHP PHP | >=7.0.0<7.0.21 | |
PHP PHP | >=7.1.0<7.1.7 | |
PHP PHP | <7.0.21 | 7.0.21 |
redhat/oniguruma | <6.3.0 | 6.3.0 |
redhat/php | <5.6.31 | 5.6.31 |
redhat/php | <7.0.21 | 7.0.21 |
redhat/php | <7.1.7 | 7.1.7 |
debian/libonig | 6.9.6-1.1 6.9.8-1 6.9.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9226 is a vulnerability in Oniguruma, as used in Oniguruma-mod in Ruby and mbstring in PHP, that allows a heap out-of-bounds write or read during regular expression compilation.
CVE-2017-9226 affects Oniguruma-mod in Ruby versions up to 2.4.1 and mbstring in PHP versions up to 7.1.5.
CVE-2017-9226 has a severity rating of 9.8, which is considered critical.
To fix CVE-2017-9226 in Oniguruma, you should upgrade to version 6.3.0 or higher.
To fix CVE-2017-9226 in PHP, you should upgrade to version 7.0.21 or higher for PHP 7.0, and version 7.1.7 or higher for PHP 7.1.