vulnerability

Amazon Linux AMI 2: CVE-2017-9224: Security patch for oniguruma, ruby (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
May 24, 2017
Added
Aug 9, 2023
Modified
Nov 27, 2024

Description

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.

Solution(s)

amazon-linux-ami-2-upgrade-onigurumaamazon-linux-ami-2-upgrade-oniguruma-debuginfoamazon-linux-ami-2-upgrade-oniguruma-develamazon-linux-ami-2-upgrade-rubyamazon-linux-ami-2-upgrade-ruby-debuginfoamazon-linux-ami-2-upgrade-ruby-develamazon-linux-ami-2-upgrade-ruby-docamazon-linux-ami-2-upgrade-ruby-irbamazon-linux-ami-2-upgrade-ruby-libsamazon-linux-ami-2-upgrade-ruby-tcltkamazon-linux-ami-2-upgrade-rubygem-bigdecimalamazon-linux-ami-2-upgrade-rubygem-io-consoleamazon-linux-ami-2-upgrade-rubygem-jsonamazon-linux-ami-2-upgrade-rubygem-minitestamazon-linux-ami-2-upgrade-rubygem-psychamazon-linux-ami-2-upgrade-rubygem-rakeamazon-linux-ami-2-upgrade-rubygem-rdocamazon-linux-ami-2-upgrade-rubygemsamazon-linux-ami-2-upgrade-rubygems-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.