An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Mar 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:* |
Thu, 06 Mar 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 11 Feb 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Debian
Debian debian Linux |
|
CPEs | cpe:2.3:a:pcre:pcre2:10.40:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Debian
Debian debian Linux |

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-03-06T08:18:54.168Z
Reserved: 2022-05-05T00:00:00.000Z
Link: CVE-2022-1586

No data.

Status : Analyzed
Published: 2022-05-16T21:15:07.793
Modified: 2025-03-25T19:39:30.433
Link: CVE-2022-1586
