{"id":"CVE-2019-9023","details":"An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.","modified":"2026-05-15T12:04:02.169087863Z","published":"2019-02-22T23:29:00.487Z","related":["ALSA-2020:1624","SUSE-RU-2019:0823-1","SUSE-SU-2019:0985-1","SUSE-SU-2019:14013-1","SUSE-SU-2019:1461-1","SUSE-SU-2022:4067-1","openSUSE-SU-2019:1572-1","openSUSE-SU-2019:1573-1","openSUSE-SU-2024:11167-1","openSUSE-SU-2024:11169-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"12.04"},{"last_affected":"14.04"},{"last_affected":"16.04"}],"cpes":["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"],"vendor_product":"canonical:ubuntu_linux","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"9.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"42.3"}],"cpes":["cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"],"vendor_product":"opensuse:leap","source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/107156"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"type":"ADVISORY","url":"https://support.f5.com/csp/article/K06372014"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3902-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3902-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4398"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=77370"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=77371"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=77381"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=77382"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=77385"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=77394"},{"type":"FIX","url":"https://bugs.php.net/bug.php?id=77418"},{"type":"FIX","url":"https://security.netapp.com/advisory/ntap-20190321-0001/"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}