Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 845195 (CVE-2022-1586, CVE-2022-1587) - <dev-libs/libpcre2-10.40: multiple vulnerabilities
Summary: <dev-libs/libpcre2-10.40: multiple vulnerabilities
Status: IN_PROGRESS
Alias: CVE-2022-1586, CVE-2022-1587
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B4 [glsa? cleanup]
Keywords:
Depends on: 845264
Blocks:
  Show dependency tree
 
Reported: 2022-05-17 17:49 UTC by John Helmert III
Modified: 2022-05-20 00:12 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-17 17:49:15 UTC
CVE-2022-1586 (https://bugzilla.redhat.com/show_bug.cgi?id=2077976):

An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.

Patches:
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c

CVE-2022-1587 (https://bugzilla.redhat.com/show_bug.cgi?id=2077983):

An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.

Patch:
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0

Please stabilize libpcre2-10.40.