Vulnerability Description
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pcre | Pcre2 | < 10.40 |
| Fedoraproject | Fedora | 35 |
| Redhat | Enterprise Linux | 8.0 |
| Netapp | Active Iq Unified Manager | - |
| Netapp | Hci Management Node | - |
| Netapp | Ontap Select Deploy Administration Utility | - |
| Netapp | Solidfire | - |
| Netapp | H300S Firmware | - |
| Netapp | H300S | - |
| Netapp | H500S Firmware | - |
| Netapp | H500S | - |
| Netapp | H700S Firmware | - |
| Netapp | H700S | - |
| Netapp | H410S Firmware | - |
| Netapp | H410S | - |
| Netapp | H410C Firmware | - |
| Netapp | H410C | - |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2077976%2CBroken LinkIssue Tracking
- https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5Broken Link
- https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/03/msg00014.htmlMailing List
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing List
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing List
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing List
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing List
- https://security.netapp.com/advisory/ntap-20221028-0009/Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2077976Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2077976%2CBroken LinkIssue Tracking
- https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5Patch
- https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5Broken Link
- https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/03/msg00014.htmlMailing List
FAQ
What is CVE-2022-1586?
CVE-2022-1586 is a vulnerability with a CVSS score of 9.1 (CRITICAL). An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue i...
How severe is CVE-2022-1586?
CVE-2022-1586 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-1586?
Check the references section above for vendor advisories and patch information. Affected products include: Pcre Pcre2, Fedoraproject Fedora, Redhat Enterprise Linux, Netapp Active Iq Unified Manager, Netapp Hci Management Node.