9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
9.5 High
AI Score
Confidence
High
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
0.004 Low
EPSS
Percentile
71.6%
Issue Overview:
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT. (CVE-2022-1586)
Affected Packages:
pcre2
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update pcre2 to update your system.
New Packages:
aarch64:
pcre2-10.23-11.amzn2.0.1.aarch64
pcre2-utf16-10.23-11.amzn2.0.1.aarch64
pcre2-utf32-10.23-11.amzn2.0.1.aarch64
pcre2-devel-10.23-11.amzn2.0.1.aarch64
pcre2-static-10.23-11.amzn2.0.1.aarch64
pcre2-tools-10.23-11.amzn2.0.1.aarch64
pcre2-debuginfo-10.23-11.amzn2.0.1.aarch64
i686:
pcre2-10.23-11.amzn2.0.1.i686
pcre2-utf16-10.23-11.amzn2.0.1.i686
pcre2-utf32-10.23-11.amzn2.0.1.i686
pcre2-devel-10.23-11.amzn2.0.1.i686
pcre2-static-10.23-11.amzn2.0.1.i686
pcre2-tools-10.23-11.amzn2.0.1.i686
pcre2-debuginfo-10.23-11.amzn2.0.1.i686
src:
pcre2-10.23-11.amzn2.0.1.src
x86_64:
pcre2-10.23-11.amzn2.0.1.x86_64
pcre2-utf16-10.23-11.amzn2.0.1.x86_64
pcre2-utf32-10.23-11.amzn2.0.1.x86_64
pcre2-devel-10.23-11.amzn2.0.1.x86_64
pcre2-static-10.23-11.amzn2.0.1.x86_64
pcre2-tools-10.23-11.amzn2.0.1.x86_64
pcre2-debuginfo-10.23-11.amzn2.0.1.x86_64
Red Hat: CVE-2022-1586
Mitre: CVE-2022-1586
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | pcre2 | < 10.23-11.amzn2.0.1 | pcre2-10.23-11.amzn2.0.1.aarch64.rpm |
Amazon Linux | 2 | aarch64 | pcre2-utf16 | < 10.23-11.amzn2.0.1 | pcre2-utf16-10.23-11.amzn2.0.1.aarch64.rpm |
Amazon Linux | 2 | aarch64 | pcre2-utf32 | < 10.23-11.amzn2.0.1 | pcre2-utf32-10.23-11.amzn2.0.1.aarch64.rpm |
Amazon Linux | 2 | aarch64 | pcre2-devel | < 10.23-11.amzn2.0.1 | pcre2-devel-10.23-11.amzn2.0.1.aarch64.rpm |
Amazon Linux | 2 | aarch64 | pcre2-static | < 10.23-11.amzn2.0.1 | pcre2-static-10.23-11.amzn2.0.1.aarch64.rpm |
Amazon Linux | 2 | aarch64 | pcre2-tools | < 10.23-11.amzn2.0.1 | pcre2-tools-10.23-11.amzn2.0.1.aarch64.rpm |
Amazon Linux | 2 | aarch64 | pcre2-debuginfo | < 10.23-11.amzn2.0.1 | pcre2-debuginfo-10.23-11.amzn2.0.1.aarch64.rpm |
Amazon Linux | 2 | i686 | pcre2 | < 10.23-11.amzn2.0.1 | pcre2-10.23-11.amzn2.0.1.i686.rpm |
Amazon Linux | 2 | i686 | pcre2-utf16 | < 10.23-11.amzn2.0.1 | pcre2-utf16-10.23-11.amzn2.0.1.i686.rpm |
Amazon Linux | 2 | i686 | pcre2-utf32 | < 10.23-11.amzn2.0.1 | pcre2-utf32-10.23-11.amzn2.0.1.i686.rpm |
9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
9.5 High
AI Score
Confidence
High
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
0.004 Low
EPSS
Percentile
71.6%