First published: Mon May 16 2022(Updated: )
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pcre Pcre2 | <10.40 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Hci Management Node | ||
NetApp ONTAP Select Deploy administration utility | ||
Netapp Solidfire | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
Netapp H410c Firmware | ||
Netapp H410c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-1586.
The severity of CVE-2022-1586 is critical with a CVSS score of 9.1.
The PCRE2 library versions up to 10.40, Fedora 35 and 36, Redhat Enterprise Linux 8.0 and 9.0, and various Netapp products are affected by CVE-2022-1586.
CVE-2022-1586 is an out-of-bounds read vulnerability in the PCRE2 library due to a unicode property matching issue in JIT-compiled regular expressions.
Update to the latest version of the PCRE2 library (version 10.41 or later) or apply the relevant security patches provided by the affected software vendors.