First published: Tue May 23 2017(Updated: )
Add oniguruma upstream fix (CVE-2017-9224, CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php70-php | <0:7.0.27-1.el6 | 0:7.0.27-1.el6 |
redhat/rh-php70-php | <0:7.0.27-1.el7 | 0:7.0.27-1.el7 |
Oniguruma Project Oniguruma | =6.2.0 | |
PHP PHP | >=5.6.0<5.6.31 | |
PHP PHP | >=7.0.0<7.0.21 | |
PHP PHP | >=7.1.0<7.1.7 | |
PHP PHP | <7.0.21 | 7.0.21 |
redhat/oniguruma | <6.3.0 | 6.3.0 |
redhat/php | <5.6.31 | 5.6.31 |
redhat/php | <7.0.21 | 7.0.21 |
redhat/php | <7.1.7 | 7.1.7 |
debian/libonig | 6.9.6-1.1 6.9.8-1 6.9.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9227 is a vulnerability in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5, which allows a stack out-of-bounds read during regular expression searching, resulting in a denial of service or potentially more severe consequences.
CVE-2017-9227 has a severity rating of 9.8 out of 10, making it a critical vulnerability.
CVE-2017-9227 affects Oniguruma 6.2.0, Oniguruma-mod in Ruby through 2.4.1, and mbstring in PHP through 7.1.5.
To fix CVE-2017-9227, update Oniguruma to version 6.3.0.
You can find more information about CVE-2017-9227 at the following references: [Reference 1](https://github.com/kkos/oniguruma/issues/58), [Reference 2](https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1466750)