CVE-2022-1586

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-1586.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-1586
Downstream
Related
Published
2022-05-16T21:15:07Z
Modified
2025-10-14T19:03:32.187335Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
[none]
Details

An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compilexclassmatchingpath() function of the pcre2jitcompile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.

References

Affected packages

Git / github.com/pcre2project/pcre2

Affected ranges

Type
GIT
Repo
https://github.com/pcre2project/pcre2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

pcre2-10.*

pcre2-10.38
pcre2-10.38-RC1
pcre2-10.39

Database specific

{
    "vanir_signatures": [
        {
            "signature_version": "v1",
            "signature_type": "Function",
            "target": {
                "file": "src/pcre2_jit_compile.c",
                "function": "compile_xclass_matchingpath"
            },
            "deprecated": false,
            "digest": {
                "length": 19889.0,
                "function_hash": "41300829383723252943297909714980710868"
            },
            "id": "CVE-2022-1586-2fd20eca",
            "source": "https://github.com/pcre2project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a"
        },
        {
            "signature_version": "v1",
            "signature_type": "Line",
            "target": {
                "file": "src/pcre2_jit_test.c"
            },
            "deprecated": false,
            "digest": {
                "line_hashes": [
                    "339620945348427712212381388545774342412",
                    "124167549058306645007988220067075173415",
                    "309395507812416031802042378554291166529",
                    "16059173172654235410661150339161003337"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2022-1586-486e13a2",
            "source": "https://github.com/pcre2project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a"
        },
        {
            "signature_version": "v1",
            "signature_type": "Line",
            "target": {
                "file": "src/pcre2_jit_compile.c"
            },
            "deprecated": false,
            "digest": {
                "line_hashes": [
                    "261031969686312999006512549674494490461",
                    "168259855099571918664674207254596473730",
                    "129755615421991772175711125174276683242",
                    "141477962428344099817664558993047106632"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2022-1586-b26c3441",
            "source": "https://github.com/pcre2project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a"
        }
    ]
}