QID 356443

Date Published: 2023-10-31

QID 356443: Amazon Linux Security Advisory for oniguruma : ALAS2-2023-2311

an issue was discovered in oniguruma 6.2.0, as used in oniguruma-mod in ruby through 2.4.1 and mbstring in php through 7.1.5.
A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation.
Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc().
A malformed regular expression containing an octal number in the form of 0 would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption. (
( CVE-2017-9226) an issue was discovered in oniguruma 6.2.0, as used in oniguruma-mod in ruby through 2.4.1 and mbstring in php through 7.1.5.
A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching.
Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer. (
( CVE-2017-9227) an issue was discovered in oniguruma 6.2.0, as used in oniguruma-mod in ruby through 2.4.1 and mbstring in php through 7.1.5.
A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition.
An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until its used as an index, resulting in an out-of-bounds write memory corruption. (
( CVE-2017-9228) an issue was discovered in oniguruma 6.2.0, as used in oniguruma-mod in ruby through 2.4.1 and mbstring in php through 7.1.5.
A sigsegv occurs in left_adjust_char_head() during regular expression compilation.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2023-2311 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 356443

    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2023-2311 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2023-2311.html