An out-of-bounds read was discovered in PCRE version 10.39, affecting recursions in JIT-compiled regular expressions. The bug is present in the function "get_recurse_data_length", declared in "pcre2_jit_compile.c". References: https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
Created pcre2 tracking bugs for this issue: Affects: fedora-all [bug 2077986]
Created mingw-pcre2 tracking bugs for this issue: Affects: fedora-all [bug 2081976]
I've submitted an upstream issue to find out which commits really fix the CVE https://github.com/PCRE2Project/pcre2/issues/122
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:5251 https://access.redhat.com/errata/RHSA-2022:5251
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-1587