oniguruma-6.8.2-2.1.el8_9
エラータID: AXSA:2024-7538:01
リリース日:
2024/02/26 Monday - 13:36
題名:
oniguruma-6.8.2-2.1.el8_9
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- phpのOnigurumaには、解放後使用の問題があり、巧妙に
細工されたマルチバイトでエンコーディングされた正規
表現パターンと文字列をペアで渡すことによって、潜在的
に攻撃者が情報漏洩や、サービス拒否攻撃、コード実行が
可能な脆弱性があります。(CVE-2019-13224)
- phpのOnigurumaには、再帰処理により、スタックの浪費
を許可してしまう脆弱性があります。(CVE-2019-16163)
- 32bit アーキテクチャでビルドされた Oniguruma の
search_in_range() 関数には、整数オーバーフローに起因する
メモリ領域の範囲外読み取りの問題があるため、リモートの
攻撃者により、細工された正規表現を介して、情報の漏洩、
およびサービス拒否攻撃 (アプリケーションのクラッシュの
発生) などを可能とする脆弱性が存在します。
(CVE-2019-19012)
- phpのOnigurumaは、UChar ポインタが文字列の終端
チェックをせずにデリファレンスされているため、ヒープ
のバッファオーバーリードを引き起こす脆弱性があります。
(CVE-2019-19203)
- phpのOnigurumaには、PFETCHがPENDのチェック無しに
呼び出されているため、ヒープのバッファオーバーリードを
引き起こす脆弱性があります。(CVE-2019-19204)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
CVE-2019-16163
Oniguruma before 6.9.3 allows Stack Exhaustion in regcomp.c because of recursion in regparse.c.
Oniguruma before 6.9.3 allows Stack Exhaustion in regcomp.c because of recursion in regparse.c.
CVE-2019-19012
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.
CVE-2019-19203
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read.
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read.
CVE-2019-19204
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.
追加情報:
N/A
ダウンロード:
SRPMS
- oniguruma-6.8.2-2.1.el8_9.src.rpm
MD5: 02b36655e7ff904b8100c6e0ae838781
SHA-256: cd6fd57479583734d561e7fa72808afe8a1877825004749343728aa9b03f3d7a
Size: 958.27 kB
Asianux Server 8 for x86_64
- oniguruma-6.8.2-2.1.el8_9.i686.rpm
MD5: 53abacaf7f2ec061b72b0f1fdd4a2b4c
SHA-256: 54f8cc8bdd38f2de1163eeb159b5d218bd25059c111bbcd478b936c6d2ec8c30
Size: 191.34 kB - oniguruma-6.8.2-2.1.el8_9.x86_64.rpm
MD5: 26dcebc3869da5e75000fb15e7c2e2d4
SHA-256: 1aa805567fb1ac7427e446199fb748066268d21b7daed044483070baf1e09a05
Size: 187.06 kB - oniguruma-devel-6.8.2-2.1.el8_9.i686.rpm
MD5: 400805ba28f91ac008c4810f94726948
SHA-256: dda4d04091825c5efb84a019b429cbbe475723c29d9323ba026915239509bda6
Size: 46.68 kB - oniguruma-devel-6.8.2-2.1.el8_9.x86_64.rpm
MD5: c8e27ee20e19eb12d66ad8ad05e006ba
SHA-256: b8da468ab4297b143c7053bdc7da986101f9c10ab4257f3513bc85c6248aed8b
Size: 46.65 kB