Source: libonig Version: 5.9.5-3.2 Severity: important Tags: upstream patch security Forwarded: https://github.com/kkos/oniguruma/issues/55
Hi, the following vulnerability was published for libonig. CVE-2017-9226[0]: | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in | Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap | out-of-bounds write or read occurs in next_state_val() during regular | expression compilation. Octal numbers larger than 0xff are not handled | correctly in fetch_token() and fetch_token_in_cc(). A malformed regular | expression containing an octal number in the form of '\700' would | produce an invalid code point value larger than 0xff in | next_state_val(), resulting in an out-of-bounds write memory | corruption. >From quick check of the code this seem to affect as well back the version in jessie, but please double-check. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-9226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226 [1] https://github.com/kkos/oniguruma/issues/55 [2] https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a [3] https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6 Please adjust the affected versions in the BTS as needed. Regards, Salvatore _______________________________________________ Secure-testing-team mailing list [email protected] http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

