An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-958-1 | libonig security update |
EUVD |
EUVD-2017-18162 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer. |
Ubuntu USN |
USN-3382-1 | PHP vulnerabilities |
Ubuntu USN |
USN-3382-2 | PHP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T17:02:43.859Z
Reserved: 2017-05-24T00:00:00
Link: CVE-2017-9224
No data.
Status : Deferred
Published: 2017-05-24T15:29:00.183
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-9224
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN