CVE-2019-9023

NameCVE-2019-9023
DescriptionAn issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1679-1, DSA-4398-1

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php5sourcejessie5.6.40+dfsg-0+deb8u1DLA-1679-1
php5source(unstable)(unfixed)
php7.0sourcestretch7.0.33-0+deb9u2DSA-4398-1
php7.0source(unstable)(unfixed)
php7.3source(unstable)7.3.1-1

Notes

Fixed in 5.6.40, 7.1.26, 7.2.14, 7.3.1
PHP Bug: https://bugs.php.net/bug.php?id=77370
PHP Bug: https://bugs.php.net/bug.php?id=77371
PHP Bug: https://bugs.php.net/bug.php?id=77381
PHP Bug: https://bugs.php.net/bug.php?id=77382
PHP Bug: https://bugs.php.net/bug.php?id=77385
PHP Bug: https://bugs.php.net/bug.php?id=77394
PHP Bug: https://bugs.php.net/bug.php?id=77418
https://github.com/php/php-src/commit/20407d06ca3cb5eeb10f876a812b40c381574bcc (7.1)
https://github.com/php/php-src/commit/31f59e1f3074ab344b473dde6077a6844ca87264 (7.1)
https://github.com/php/php-src/commit/28362ed4fae6969b5a8878591a5a06eadf114e03 (7.1)
https://github.com/php/php-src/commit/9d6c59eeea88a3e9d7039cb4fed5126ef704593a (7.1)

Search for package or bug name: Reporting problems