PatchSiren cyber security CVE debrief
CVE-2016-9108 Fedoraproject CVE debrief
CVE-2016-9108 is an integer overflow in MuJS's js_regcomp function in regexp.c. A crafted regular expression can trigger an application crash, resulting in denial of service. NVD assigns CVSS 3.1 7.5 High with a network-based, unauthenticated, no-user-interaction impact profile. The NVD record associates the issue with MuJS versions before commit b6de34ac6d8bb7dd5461c57940acfbd3ee7fd93e, and also lists Fedora 23, 24, and 25 as vulnerable CPEs in the record.
- Vendor
- Fedoraproject
- Product
- CVE-2016-9108
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-03
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-03
- Advisory updated
- 2026-05-13
Who should care
Teams running MuJS or systems that package MuJS, especially Fedora 23/24/25-era deployments and any application that evaluates untrusted regular expressions through MuJS.
Technical summary
The issue is classified as CWE-190 (integer overflow). According to the supplied NVD record, the vulnerable path is js_regcomp in regexp.c, where a crafted regular expression can trigger an overflow and crash the process. The impact reported in the corpus is denial of service only (availability loss), with no confidentiality or integrity impact in the CVSS vector.
Defensive priority
High
Recommended defensive actions
- Upgrade MuJS to a version that includes commit b6de34ac6d8bb7dd5461c57940acfbd3ee7fd93e or later.
- If you consume MuJS through a Linux distribution package, apply the vendor or distro advisory referenced in the record and verify the fixed package version.
- Inventory any applications that accept untrusted regular expressions or regex-like input through MuJS and prioritize them for patching.
- Validate runtime stability after remediation by testing normal regex parsing paths in staging rather than production.
- Track the linked Red Hat bug and Fedora package announcement references for packaging-specific guidance and backport status.
Evidence notes
The core technical details come from the supplied NVD record: CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, CWE-190, and the vulnerable scope in MuJS before commit b6de34ac6d8bb7dd5461c57940acfbd3ee7fd93e. The corpus also includes an earlier public disclosure reference on 2016-10-30 via the oss-security mailing list, plus Red Hat Bugzilla and Fedora package-announce references for downstream tracking. Use the CVE published date of 2017-02-03 for record timing and treat 2026-05-13 only as the NVD modification date, not as the vulnerability date.
Official resources
-
CVE-2016-9108 CVE record
CVE.org
-
CVE-2016-9108 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Third Party Advisory
- Source reference
- Source reference
- Source reference
The CVE was published in NVD on 2017-02-03. The supplied references indicate an earlier public disclosure path on 2016-10-30 via oss-security, while the NVD record was later modified on 2026-05-13. That later modified date reflects record c