An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbcenclen() during regular expression searching. Invalid handling of reg->dmin in forwardsearchrange() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.
[
{
"digest": {
"length": 3055.0,
"function_hash": "107256506076362528630293821856860722664"
},
"source": "https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814",
"signature_version": "v1",
"target": {
"function": "forward_search_range",
"file": "src/regexec.c"
},
"deprecated": false,
"id": "CVE-2017-9227-87db20c4",
"signature_type": "Function"
},
{
"digest": {
"line_hashes": [
"244917375269462939977115246385469839147",
"260813193810532824259245784304712775384",
"120231572746728307893137213880243448934",
"118234623326047463135166462558158684412"
],
"threshold": 0.9
},
"source": "https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814",
"signature_version": "v1",
"target": {
"file": "src/regexec.c"
},
"deprecated": false,
"id": "CVE-2017-9227-ce1115bb",
"signature_type": "Line"
}
]