emacs-bug-tracker
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[debbugs-tracker] bug#27993: closed (Oniguruma (PHP and Ruby) security i


From: GNU bug Tracking System
Subject: [debbugs-tracker] bug#27993: closed (Oniguruma (PHP and Ruby) security issues)
Date: Tue, 26 Feb 2019 02:09:01 +0000

Your message dated Mon, 25 Feb 2019 21:08:28 -0500
with message-id <address@hidden>
and subject line Re: Oniguruma (PHP and Ruby) security issues
has caused the debbugs.gnu.org bug report #27993,
regarding Oniguruma (PHP and Ruby) security issues
to be marked as done.

(If you believe you have received this mail in error, please contact
address@hidden)


-- 
27993: http://debbugs.gnu.org/cgi/bugreport.cgi?bug=27993
GNU Bug Tracking System
Contact address@hidden with problems
--- Begin Message --- Subject: Oniguruma (PHP and Ruby) security issues Date: Sun, 6 Aug 2017 16:29:33 -0400 User-agent: Mutt/1.8.3 (2017-05-23)
Recently several serious bugs were fixed in Oniguruma,
CVE-2017-{9224,9225,9226,9227,9228,9229}:

https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=oniguruma
https://github.com/kkos/oniguruma#fixed-security-issues

I'm not sure exactly which Oniguruma release fixed the bugs.

Ruby includes vulnerable code from Oniguruma. I didn't see any fixes in
the Ruby Git repo.

I tried building PHP with Oniguruma 6.4.0 or 6.5.0 but the PHP test
suite fails like this:

=====================================================================
FAILED TEST SUMMARY
---------------------------------------------------------------------
Bug #72994 (mbc_to_code() out of bounds read) [ext/mbstring/tests/bug72994.phpt]
Test mb_ereg_replace() function : usage variations  - <type here specifics of 
this variation> [ext/mbstring/tests/mb_ereg_replace_variation1.phpt]
Test mb_ereg() function : usage variations - pass different character classes 
to see they match correctly [ext/mbstring/tests/mb_ereg_variation3.phpt]
=====================================================================

I tried using the bundled Oniguruma, which includes the fixes, and it
fails like this:

=====================================================================
FAILED TEST SUMMARY
---------------------------------------------------------------------
Bug #60120 proc_open hangs with stdin/out with 2048+ bytes 
[ext/standard/tests/streams/proc_open_bug60120.phpt]
=====================================================================

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message --- Subject: Re: Oniguruma (PHP and Ruby) security issues Date: Mon, 25 Feb 2019 21:08:28 -0500 User-agent: Mutt/1.11.3 (2019-02-01)
On Sun, Aug 06, 2017 at 04:29:33PM -0400, Leo Famulari wrote:
> Recently several serious bugs were fixed in Oniguruma,
> CVE-2017-{9224,9225,9226,9227,9228,9229}:

[...]

> I'm not sure exactly which Oniguruma release fixed the bugs.

I'm still not sure, but our PHP package is using the latest Oniguruma,
and a lot of time has passed since this bug was opened. Closing...

Attachment: signature.asc
Description: PGP signature


--- End Message ---

reply via email to

[Prev in Thread] Current Thread [Next in Thread]