An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.
| Software | From | Fixed in |
|---|---|---|
| oniguruma_project / oniguruma | 6.9.4-rc1 | 6.9.4-rc1.x |
| oniguruma_project / oniguruma | 6.0.0 | 6.9.3.x |
| debian / debian_linux | 8.0 | 8.0.x |
| fedoraproject / fedora | 30 | 30.x |
| redhat / enterprise_linux | 8.0 | 8.0.x |
| fedoraproject / fedora | 31 | 31.x |