CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
AI Score
Confidence
Low
EPSS
Percentile
72.0%
Package : pcre2
Version : 10.32-5+deb10u1
CVE ID : CVE-2019-20454 CVE-2022-1586 CVE-2022-1587
Debian Bug : 1011954
Multiple out-of-bounds read vulnerabilities were found in pcre2, a Perl
Compatible Regular Expression library, which could result in information
disclosure or denial or service.
CVE-2019-20454
Out-of-bounds read when the pattern \X is JIT compiled and used to
match specially crafted subjects in non-UTF mode.
CVE-2022-1586
Out-of-bounds read involving unicode property matching in
JIT-compiled regular expressions. The issue occurs because the
character was not fully read in case-less matching within JIT.
CVE-2022-1587
Out-of-bounds read affecting recursions in JIT-compiled regular
expressions caused by duplicate data transfers.
This upload also fixes a subject buffer overread in JIT when UTF is
disabled and \X or \R has a greater than 1 fixed quantifier. This issue
was found by Yunho Kim.
For Debian 10 buster, these problems have been fixed in version
10.32-5+deb10u1.
We recommend that you upgrade your pcre2 packages.
For the detailed security status of pcre2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pcre2
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 11 | i386 | libpcre2-16-0-dbgsym | <Â 10.36-2+deb11u1 | libpcre2-16-0-dbgsym_10.36-2+deb11u1_i386.deb |
Debian | 11 | s390x | libpcre2-32-0-dbgsym | <Â 10.36-2+deb11u1 | libpcre2-32-0-dbgsym_10.36-2+deb11u1_s390x.deb |
Debian | 11 | armhf | pcre2-utils-dbgsym | <Â 10.36-2+deb11u1 | pcre2-utils-dbgsym_10.36-2+deb11u1_armhf.deb |
Debian | 11 | i386 | libpcre2-8-0-dbgsym | <Â 10.36-2+deb11u1 | libpcre2-8-0-dbgsym_10.36-2+deb11u1_i386.deb |
Debian | 10 | arm64 | libpcre2-dev | <Â 10.32-5+deb10u1 | libpcre2-dev_10.32-5+deb10u1_arm64.deb |
Debian | 11 | armhf | libpcre2-32-0 | <Â 10.36-2+deb11u1 | libpcre2-32-0_10.36-2+deb11u1_armhf.deb |
Debian | 11 | amd64 | libpcre2-posix2 | <Â 10.36-2+deb11u1 | libpcre2-posix2_10.36-2+deb11u1_amd64.deb |
Debian | 11 | mipsel | libpcre2-8-0-udeb | <Â 10.36-2+deb11u1 | libpcre2-8-0-udeb_10.36-2+deb11u1_mipsel.deb |
Debian | 11 | amd64 | libpcre2-dev | <Â 10.36-2+deb11u1 | libpcre2-dev_10.36-2+deb11u1_amd64.deb |
Debian | 11 | ppc64el | libpcre2-posix2 | <Â 10.36-2+deb11u1 | libpcre2-posix2_10.36-2+deb11u1_ppc64el.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
AI Score
Confidence
Low
EPSS
Percentile
72.0%