An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compilexclassmatchingpath() function of the pcre2jitcompile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
[
{
"id": "CVE-2022-1586-2fd20eca",
"digest": {
"length": 19889.0,
"function_hash": "41300829383723252943297909714980710868"
},
"source": "https://github.com/pcre2project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a",
"deprecated": false,
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "src/pcre2_jit_compile.c",
"function": "compile_xclass_matchingpath"
}
},
{
"id": "CVE-2022-1586-486e13a2",
"digest": {
"threshold": 0.9,
"line_hashes": [
"339620945348427712212381388545774342412",
"124167549058306645007988220067075173415",
"309395507812416031802042378554291166529",
"16059173172654235410661150339161003337"
]
},
"source": "https://github.com/pcre2project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a",
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "src/pcre2_jit_test.c"
}
},
{
"id": "CVE-2022-1586-b26c3441",
"digest": {
"threshold": 0.9,
"line_hashes": [
"261031969686312999006512549674494490461",
"168259855099571918664674207254596473730",
"129755615421991772175711125174276683242",
"141477962428344099817664558993047106632"
]
},
"source": "https://github.com/pcre2project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a",
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "src/pcre2_jit_compile.c"
}
}
]