Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-1345 (GCVE-0-2015-1345)
Vulnerability from cvelistv5
Published
2015-02-12 16:00
Modified
2024-08-06 04:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:40:18.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "RHSA-2015:1447", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1447.html" }, { "name": "openSUSE-SU-2015:0243", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html" }, { "name": "72281", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72281" }, { "name": "[oss-security] 20150122 Re: CVE request: grep heap buffer overrun", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/22/10" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-22T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "RHSA-2015:1447", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1447.html" }, { "name": "openSUSE-SU-2015:0243", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html" }, { "name": "72281", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72281" }, { "name": "[oss-security] 20150122 Re: CVE request: grep heap buffer overrun", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/22/10" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1345", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563", "refsource": "CONFIRM", "url": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "RHSA-2015:1447", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1447.html" }, { "name": "openSUSE-SU-2015:0243", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html" }, { "name": "72281", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72281" }, { "name": "[oss-security] 20150122 Re: CVE request: grep heap buffer overrun", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/22/10" }, { "name": "http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-1345", "datePublished": "2015-02-12T16:00:00", "dateReserved": "2015-01-22T00:00:00", "dateUpdated": "2024-08-06T04:40:18.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-1345\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-02-12T16:59:03.707\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n bmexec_trans en kwset.c en grep 2.19 hasta 2.21 permite a usuarios locales causar una denegaci\u00f3n de servicio (lectura de la memoria din\u00e1mica fuera de rango y ca\u00edda) a trav\u00e9s de entradas manipuladas cuando se utiliza la opci\u00f3n -F.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:grep:2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF781F3D-AE9F-47BF-95A6-004A5D89F870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:grep:2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6952087B-9AD8-4616-866D-F99C286FA785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:grep:2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CFADBFF-B026-47C1-857D-DB945D0BFBBF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"}]}]}],\"references\":[{\"url\":\"http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1447.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/01/22/10\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/72281\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1447.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/01/22/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/72281\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
cnvd-2015-00633
Vulnerability from cnvd
Title
grep 'kwset.c'远程缓冲区溢出漏洞
Description
Grep是一款Unix系统下的文本搜索工具。
grep 'kwset.c'存在远程缓冲区溢出漏洞,允许攻击者在应用程序上下文中执行任意代码或发起拒绝服务攻击。
Severity
高
VLAI Severity ?
Patch Name
grep 'kwset.c'远程缓冲区溢出漏洞的补丁
Patch Description
Grep是一款Unix系统下的文本搜索工具。
grep 'kwset.c'存在远程缓冲区溢出漏洞,允许攻击者在应用程序上下文中执行任意代码或发起拒绝服务攻击。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可以联系供应商获得补丁信息: http://www.gnu.org/software/grep/
Reference
http://www.securityfocus.com/bid/72281
Impacted products
Name | GNU Project grep |
---|
{ "bids": { "bid": { "bidNumber": "72281" } }, "cves": { "cve": { "cveNumber": "CVE-2015-1345" } }, "description": "Grep\u662f\u4e00\u6b3eUnix\u7cfb\u7edf\u4e0b\u7684\u6587\u672c\u641c\u7d22\u5de5\u5177\u3002\r\n\r\ngrep \u0027kwset.c\u0027\u5b58\u5728\u8fdc\u7a0b\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5728\u5e94\u7528\u7a0b\u5e8f\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u53d1\u8d77\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002", "discovererName": "Nima Aghdaii and Yuliy Pisetsky", "formalWay": "\u7528\u6237\u53ef\u4ee5\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttp://www.gnu.org/software/grep/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2015-00633", "openTime": "2015-01-27", "patchDescription": "Grep\u662f\u4e00\u6b3eUnix\u7cfb\u7edf\u4e0b\u7684\u6587\u672c\u641c\u7d22\u5de5\u5177\u3002\r\n\r\ngrep \u0027kwset.c\u0027\u5b58\u5728\u8fdc\u7a0b\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5728\u5e94\u7528\u7a0b\u5e8f\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u53d1\u8d77\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "grep \u0027kwset.c\u0027\u8fdc\u7a0b\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "GNU Project grep" }, "referenceLink": "http://www.securityfocus.com/bid/72281", "serverity": "\u9ad8", "submitTime": "2015-01-26", "title": "grep \u0027kwset.c\u0027\u8fdc\u7a0b\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e" }
rhsa-2015_1447
Vulnerability from csaf_redhat
Published
2015-07-20 14:43
Modified
2024-11-22 08:52
Summary
Red Hat Security Advisory: grep security, bug fix, and enhancement update
Notes
Topic
Updated grep packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Low security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
The grep utility searches through textual input for lines that contain a
match to a specified pattern and then prints the matching lines. The GNU
grep utilities include grep, egrep, and fgrep.
An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way grep parsed large lines of data. An attacker able to trick
a user into running grep on a specially crafted data file could use this
flaw to crash grep or, potentially, execute arbitrary code with the
privileges of the user running grep. (CVE-2012-5667)
A heap-based buffer overflow flaw was found in the way grep processed
certain pattern and text combinations. An attacker able to trick a user
into running grep on specially crafted input could use this flaw to crash
grep or, potentially, read from uninitialized memory. (CVE-2015-1345)
The grep packages have been upgraded to upstream version 2.20, which
provides a number of bug fixes and enhancements over the previous version.
Notably, the speed of various operations has been improved significantly.
Now, the recursive grep utility uses the fts function of the gnulib library
for directory traversal, so that it can handle much larger directories
without reporting the "File name too long" error message, and it can
operate faster when dealing with large directory hierarchies. (BZ#982215,
BZ#1064668, BZ#1126757, BZ#1167766, BZ#1171806)
This update also fixes the following bugs:
* Prior to this update, the \w and \W symbols were inconsistently matched
to the [:alnum:] character class. Consequently, regular expressions that used \w and \W in some cases had incorrect results. An upstream patch which fixes the matching problem has been applied, and \w is now matched to the [_[:alnum:]] character and \W to the [^_[:alnum:]] character consistently. (BZ#799863)
* Previously, the "--fixed-regexp" command-line option was not included in
the grep(1) manual page. Consequently, the manual page was inconsistent
with the built-in help of the grep utility. To fix this bug, grep(1) has
been updated to include a note informing the user that "--fixed-regexp" is
an obsolete option. Now, the built-in help and manual page are consistent
regarding the "--fixed-regexp" option. (BZ#1103270)
* Previously, the Perl Compatible Regular Expression (PCRE) library did not
work correctly when matching non-UTF-8 text in UTF-8 mode. Consequently, an
error message about invalid UTF-8 byte sequence characters was returned.
To fix this bug, patches from upstream have been applied to the PCRE
library and the grep utility. As a result, PCRE now skips non-UTF-8
characters as non-matching text without returning any error message.
(BZ#1193030)
All grep users are advised to upgrade to these updated packages, which
correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated grep packages that fix two security issues, several bugs, and add\nvarious enhancements are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Low security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The grep utility searches through textual input for lines that contain a\nmatch to a specified pattern and then prints the matching lines. The GNU\ngrep utilities include grep, egrep, and fgrep.\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way grep parsed large lines of data. An attacker able to trick\na user into running grep on a specially crafted data file could use this\nflaw to crash grep or, potentially, execute arbitrary code with the\nprivileges of the user running grep. (CVE-2012-5667)\n\nA heap-based buffer overflow flaw was found in the way grep processed\ncertain pattern and text combinations. An attacker able to trick a user\ninto running grep on specially crafted input could use this flaw to crash\ngrep or, potentially, read from uninitialized memory. (CVE-2015-1345)\n\nThe grep packages have been upgraded to upstream version 2.20, which\nprovides a number of bug fixes and enhancements over the previous version.\nNotably, the speed of various operations has been improved significantly.\nNow, the recursive grep utility uses the fts function of the gnulib library\nfor directory traversal, so that it can handle much larger directories\nwithout reporting the \"File name too long\" error message, and it can\noperate faster when dealing with large directory hierarchies. (BZ#982215,\nBZ#1064668, BZ#1126757, BZ#1167766, BZ#1171806)\n\nThis update also fixes the following bugs:\n\n* Prior to this update, the \\w and \\W symbols were inconsistently matched\nto the [:alnum:] character class. Consequently, regular expressions that used \\w and \\W in some cases had incorrect results. An upstream patch which fixes the matching problem has been applied, and \\w is now matched to the [_[:alnum:]] character and \\W to the [^_[:alnum:]] character consistently. (BZ#799863)\n\n* Previously, the \"--fixed-regexp\" command-line option was not included in\nthe grep(1) manual page. Consequently, the manual page was inconsistent\nwith the built-in help of the grep utility. To fix this bug, grep(1) has\nbeen updated to include a note informing the user that \"--fixed-regexp\" is\nan obsolete option. Now, the built-in help and manual page are consistent\nregarding the \"--fixed-regexp\" option. (BZ#1103270)\n\n* Previously, the Perl Compatible Regular Expression (PCRE) library did not\nwork correctly when matching non-UTF-8 text in UTF-8 mode. Consequently, an\nerror message about invalid UTF-8 byte sequence characters was returned.\nTo fix this bug, patches from upstream have been applied to the PCRE\nlibrary and the grep utility. As a result, PCRE now skips non-UTF-8\ncharacters as non-matching text without returning any error message.\n(BZ#1193030)\n\nAll grep users are advised to upgrade to these updated packages, which\ncorrect these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1447", "url": "https://access.redhat.com/errata/RHSA-2015:1447" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "799863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799863" }, { "category": "external", "summary": "889935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889935" }, { "category": "external", "summary": "982215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=982215" }, { "category": "external", "summary": "1103270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103270" }, { "category": "external", "summary": "1167766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167766" }, { "category": "external", "summary": "1171806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171806" }, { "category": "external", "summary": "1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1447.json" } ], "title": "Red Hat Security Advisory: grep security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T08:52:37+00:00", "generator": { "date": "2024-11-22T08:52:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1447", "initial_release_date": "2015-07-20T14:43:55+00:00", "revision_history": [ { "date": "2015-07-20T14:43:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-07-20T14:43:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:52:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.i686", "product": { "name": "grep-0:2.20-3.el6.i686", "product_id": "grep-0:2.20-3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=i686" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.i686", "product": { "name": "grep-debuginfo-0:2.20-3.el6.i686", "product_id": "grep-debuginfo-0:2.20-3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.x86_64", "product": { "name": "grep-0:2.20-3.el6.x86_64", "product_id": "grep-0:2.20-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.x86_64", "product": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64", "product_id": "grep-debuginfo-0:2.20-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.src", "product": { "name": "grep-0:2.20-3.el6.src", "product_id": "grep-0:2.20-3.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.s390x", "product": { "name": "grep-0:2.20-3.el6.s390x", "product_id": "grep-0:2.20-3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=s390x" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.s390x", "product": { "name": "grep-debuginfo-0:2.20-3.el6.s390x", "product_id": "grep-debuginfo-0:2.20-3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.ppc64", "product": { "name": "grep-0:2.20-3.el6.ppc64", "product_id": "grep-0:2.20-3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.ppc64", "product": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64", "product_id": "grep-debuginfo-0:2.20-3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-5667", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2012-12-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "889935" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way grep parsed large lines of data. An attacker able to trick a user into running grep on a specially crafted data file could use this flaw to crash grep or, potentially, execute arbitrary code with the privileges of the user running grep.", "title": "Vulnerability description" }, { "category": "summary", "text": "grep: Integer overflow leading to heap-based buffer-overflow when reading large lines", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of grep as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5667" }, { "category": "external", "summary": "RHBZ#889935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889935" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5667", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5667" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5667", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5667" } ], "release_date": "2012-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-20T14:43:55+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1447" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "grep: Integer overflow leading to heap-based buffer-overflow when reading large lines" }, { "cve": "CVE-2015-1345", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1183651" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "grep: heap buffer overrun", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect versions of grep as shipped in Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1345" }, { "category": "external", "summary": "RHBZ#1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1345", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1345" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345" } ], "release_date": "2015-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-20T14:43:55+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1447" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "grep: heap buffer overrun" } ] }
rhsa-2015_2111
Vulnerability from csaf_redhat
Published
2015-11-19 03:18
Modified
2024-11-22 08:52
Summary
Red Hat Security Advisory: grep security and bug fix update
Notes
Topic
Updated grep packages that fix one security issue and several bugs are now
available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Low security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
The grep utility searches through textual input for lines that contain a
match to a specified pattern and then prints the matching lines. The GNU
grep utilities include grep, egrep, and fgrep.
A heap-based buffer overflow flaw was found in the way grep processed
certain pattern and text combinations. An attacker able to trick a user
into running grep on specially crafted input could use this flaw to crash
grep or, potentially, read from uninitialized memory. (CVE-2015-1345)
This update also fixes the following bugs:
* Prior to this update, the \w and \W symbols were inconsistently matched
to the [:alnum:] character class. Consequently, using regular expressions
with "\w" and "\W" could lead to incorrect results. With this update, "\w"
is consistently matched to the [_[:alnum:]] character, and "\W" is
consistently matched to the [^_[:alnum:]] character. (BZ#1159012)
* Previously, the Perl Compatible Regular Expression (PCRE) matcher
(selected by the "-P" parameter in grep) did not work correctly when
matching non-UTF-8 text in UTF-8 locales. Consequently, an error message
about invalid UTF-8 byte sequence characters was returned. To fix this bug,
patches from upstream have been applied to the grep utility. As a result,
PCRE now skips non-UTF-8 characters as non-matching text without returning
any error message. (BZ#1217080)
All grep users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated grep packages that fix one security issue and several bugs are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Low security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The grep utility searches through textual input for lines that contain a\nmatch to a specified pattern and then prints the matching lines. The GNU\ngrep utilities include grep, egrep, and fgrep.\n\nA heap-based buffer overflow flaw was found in the way grep processed\ncertain pattern and text combinations. An attacker able to trick a user\ninto running grep on specially crafted input could use this flaw to crash\ngrep or, potentially, read from uninitialized memory. (CVE-2015-1345)\n\nThis update also fixes the following bugs:\n\n* Prior to this update, the \\w and \\W symbols were inconsistently matched\nto the [:alnum:] character class. Consequently, using regular expressions\nwith \"\\w\" and \"\\W\" could lead to incorrect results. With this update, \"\\w\"\nis consistently matched to the [_[:alnum:]] character, and \"\\W\" is\nconsistently matched to the [^_[:alnum:]] character. (BZ#1159012)\n\n* Previously, the Perl Compatible Regular Expression (PCRE) matcher\n(selected by the \"-P\" parameter in grep) did not work correctly when\nmatching non-UTF-8 text in UTF-8 locales. Consequently, an error message\nabout invalid UTF-8 byte sequence characters was returned. To fix this bug,\npatches from upstream have been applied to the grep utility. As a result,\nPCRE now skips non-UTF-8 characters as non-matching text without returning\nany error message. (BZ#1217080)\n\nAll grep users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2111", "url": "https://access.redhat.com/errata/RHSA-2015:2111" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1103259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103259" }, { "category": "external", "summary": "1159012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159012" }, { "category": "external", "summary": "1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2111.json" } ], "title": "Red Hat Security Advisory: grep security and bug fix update", "tracking": { "current_release_date": "2024-11-22T08:52:42+00:00", "generator": { "date": "2024-11-22T08:52:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2111", "initial_release_date": "2015-11-19T03:18:28+00:00", "revision_history": [ { "date": "2015-11-19T03:18:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-11-19T03:18:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:52:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.aarch64", "product": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64", "product_id": "grep-debuginfo-0:2.20-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "grep-0:2.20-2.el7.aarch64", "product": { "name": "grep-0:2.20-2.el7.aarch64", "product_id": "grep-0:2.20-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-2.el7.ppc64", "product": { "name": "grep-0:2.20-2.el7.ppc64", "product_id": "grep-0:2.20-2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.ppc64", "product": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64", "product_id": "grep-debuginfo-0:2.20-2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.ppc64le", "product": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le", "product_id": "grep-debuginfo-0:2.20-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "grep-0:2.20-2.el7.ppc64le", "product": { "name": "grep-0:2.20-2.el7.ppc64le", "product_id": "grep-0:2.20-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-2.el7.s390x", "product": { "name": "grep-0:2.20-2.el7.s390x", "product_id": "grep-0:2.20-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.s390x", "product": { "name": "grep-debuginfo-0:2.20-2.el7.s390x", "product_id": "grep-debuginfo-0:2.20-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.x86_64", "product": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64", "product_id": "grep-debuginfo-0:2.20-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "grep-0:2.20-2.el7.x86_64", "product": { "name": "grep-0:2.20-2.el7.x86_64", "product_id": "grep-0:2.20-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-2.el7.src", "product": { "name": "grep-0:2.20-2.el7.src", "product_id": "grep-0:2.20-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1345", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1183651" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "grep: heap buffer overrun", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect versions of grep as shipped in Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client:grep-0:2.20-2.el7.aarch64", "7Client:grep-0:2.20-2.el7.ppc64", "7Client:grep-0:2.20-2.el7.ppc64le", "7Client:grep-0:2.20-2.el7.s390x", "7Client:grep-0:2.20-2.el7.src", "7Client:grep-0:2.20-2.el7.x86_64", "7Client:grep-debuginfo-0:2.20-2.el7.aarch64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Client:grep-debuginfo-0:2.20-2.el7.s390x", "7Client:grep-debuginfo-0:2.20-2.el7.x86_64", "7ComputeNode:grep-0:2.20-2.el7.aarch64", "7ComputeNode:grep-0:2.20-2.el7.ppc64", "7ComputeNode:grep-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-0:2.20-2.el7.s390x", "7ComputeNode:grep-0:2.20-2.el7.src", "7ComputeNode:grep-0:2.20-2.el7.x86_64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64", "7Server:grep-0:2.20-2.el7.aarch64", "7Server:grep-0:2.20-2.el7.ppc64", "7Server:grep-0:2.20-2.el7.ppc64le", "7Server:grep-0:2.20-2.el7.s390x", "7Server:grep-0:2.20-2.el7.src", "7Server:grep-0:2.20-2.el7.x86_64", "7Server:grep-debuginfo-0:2.20-2.el7.aarch64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Server:grep-debuginfo-0:2.20-2.el7.s390x", "7Server:grep-debuginfo-0:2.20-2.el7.x86_64", "7Workstation:grep-0:2.20-2.el7.aarch64", "7Workstation:grep-0:2.20-2.el7.ppc64", "7Workstation:grep-0:2.20-2.el7.ppc64le", "7Workstation:grep-0:2.20-2.el7.s390x", "7Workstation:grep-0:2.20-2.el7.src", "7Workstation:grep-0:2.20-2.el7.x86_64", "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x", "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1345" }, { "category": "external", "summary": "RHBZ#1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1345", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1345" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345" } ], "release_date": "2015-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-19T03:18:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client:grep-0:2.20-2.el7.aarch64", "7Client:grep-0:2.20-2.el7.ppc64", "7Client:grep-0:2.20-2.el7.ppc64le", "7Client:grep-0:2.20-2.el7.s390x", "7Client:grep-0:2.20-2.el7.src", "7Client:grep-0:2.20-2.el7.x86_64", "7Client:grep-debuginfo-0:2.20-2.el7.aarch64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Client:grep-debuginfo-0:2.20-2.el7.s390x", "7Client:grep-debuginfo-0:2.20-2.el7.x86_64", "7ComputeNode:grep-0:2.20-2.el7.aarch64", "7ComputeNode:grep-0:2.20-2.el7.ppc64", "7ComputeNode:grep-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-0:2.20-2.el7.s390x", "7ComputeNode:grep-0:2.20-2.el7.src", "7ComputeNode:grep-0:2.20-2.el7.x86_64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64", "7Server:grep-0:2.20-2.el7.aarch64", "7Server:grep-0:2.20-2.el7.ppc64", "7Server:grep-0:2.20-2.el7.ppc64le", "7Server:grep-0:2.20-2.el7.s390x", "7Server:grep-0:2.20-2.el7.src", "7Server:grep-0:2.20-2.el7.x86_64", "7Server:grep-debuginfo-0:2.20-2.el7.aarch64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Server:grep-debuginfo-0:2.20-2.el7.s390x", "7Server:grep-debuginfo-0:2.20-2.el7.x86_64", "7Workstation:grep-0:2.20-2.el7.aarch64", "7Workstation:grep-0:2.20-2.el7.ppc64", "7Workstation:grep-0:2.20-2.el7.ppc64le", "7Workstation:grep-0:2.20-2.el7.s390x", "7Workstation:grep-0:2.20-2.el7.src", "7Workstation:grep-0:2.20-2.el7.x86_64", "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x", "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2111" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client:grep-0:2.20-2.el7.aarch64", "7Client:grep-0:2.20-2.el7.ppc64", "7Client:grep-0:2.20-2.el7.ppc64le", "7Client:grep-0:2.20-2.el7.s390x", "7Client:grep-0:2.20-2.el7.src", "7Client:grep-0:2.20-2.el7.x86_64", "7Client:grep-debuginfo-0:2.20-2.el7.aarch64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Client:grep-debuginfo-0:2.20-2.el7.s390x", "7Client:grep-debuginfo-0:2.20-2.el7.x86_64", "7ComputeNode:grep-0:2.20-2.el7.aarch64", "7ComputeNode:grep-0:2.20-2.el7.ppc64", "7ComputeNode:grep-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-0:2.20-2.el7.s390x", "7ComputeNode:grep-0:2.20-2.el7.src", "7ComputeNode:grep-0:2.20-2.el7.x86_64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64", "7Server:grep-0:2.20-2.el7.aarch64", "7Server:grep-0:2.20-2.el7.ppc64", "7Server:grep-0:2.20-2.el7.ppc64le", "7Server:grep-0:2.20-2.el7.s390x", "7Server:grep-0:2.20-2.el7.src", "7Server:grep-0:2.20-2.el7.x86_64", "7Server:grep-debuginfo-0:2.20-2.el7.aarch64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Server:grep-debuginfo-0:2.20-2.el7.s390x", "7Server:grep-debuginfo-0:2.20-2.el7.x86_64", "7Workstation:grep-0:2.20-2.el7.aarch64", "7Workstation:grep-0:2.20-2.el7.ppc64", "7Workstation:grep-0:2.20-2.el7.ppc64le", "7Workstation:grep-0:2.20-2.el7.s390x", "7Workstation:grep-0:2.20-2.el7.src", "7Workstation:grep-0:2.20-2.el7.x86_64", "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x", "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "grep: heap buffer overrun" } ] }
RHSA-2015:1447
Vulnerability from csaf_redhat
Published
2015-07-20 14:43
Modified
2025-10-09 14:22
Summary
Red Hat Security Advisory: grep security, bug fix, and enhancement update
Notes
Topic
Updated grep packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Low security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
The grep utility searches through textual input for lines that contain a
match to a specified pattern and then prints the matching lines. The GNU
grep utilities include grep, egrep, and fgrep.
An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way grep parsed large lines of data. An attacker able to trick
a user into running grep on a specially crafted data file could use this
flaw to crash grep or, potentially, execute arbitrary code with the
privileges of the user running grep. (CVE-2012-5667)
A heap-based buffer overflow flaw was found in the way grep processed
certain pattern and text combinations. An attacker able to trick a user
into running grep on specially crafted input could use this flaw to crash
grep or, potentially, read from uninitialized memory. (CVE-2015-1345)
The grep packages have been upgraded to upstream version 2.20, which
provides a number of bug fixes and enhancements over the previous version.
Notably, the speed of various operations has been improved significantly.
Now, the recursive grep utility uses the fts function of the gnulib library
for directory traversal, so that it can handle much larger directories
without reporting the "File name too long" error message, and it can
operate faster when dealing with large directory hierarchies. (BZ#982215,
BZ#1064668, BZ#1126757, BZ#1167766, BZ#1171806)
This update also fixes the following bugs:
* Prior to this update, the \w and \W symbols were inconsistently matched
to the [:alnum:] character class. Consequently, regular expressions that used \w and \W in some cases had incorrect results. An upstream patch which fixes the matching problem has been applied, and \w is now matched to the [_[:alnum:]] character and \W to the [^_[:alnum:]] character consistently. (BZ#799863)
* Previously, the "--fixed-regexp" command-line option was not included in
the grep(1) manual page. Consequently, the manual page was inconsistent
with the built-in help of the grep utility. To fix this bug, grep(1) has
been updated to include a note informing the user that "--fixed-regexp" is
an obsolete option. Now, the built-in help and manual page are consistent
regarding the "--fixed-regexp" option. (BZ#1103270)
* Previously, the Perl Compatible Regular Expression (PCRE) library did not
work correctly when matching non-UTF-8 text in UTF-8 mode. Consequently, an
error message about invalid UTF-8 byte sequence characters was returned.
To fix this bug, patches from upstream have been applied to the PCRE
library and the grep utility. As a result, PCRE now skips non-UTF-8
characters as non-matching text without returning any error message.
(BZ#1193030)
All grep users are advised to upgrade to these updated packages, which
correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated grep packages that fix two security issues, several bugs, and add\nvarious enhancements are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Low security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The grep utility searches through textual input for lines that contain a\nmatch to a specified pattern and then prints the matching lines. The GNU\ngrep utilities include grep, egrep, and fgrep.\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way grep parsed large lines of data. An attacker able to trick\na user into running grep on a specially crafted data file could use this\nflaw to crash grep or, potentially, execute arbitrary code with the\nprivileges of the user running grep. (CVE-2012-5667)\n\nA heap-based buffer overflow flaw was found in the way grep processed\ncertain pattern and text combinations. An attacker able to trick a user\ninto running grep on specially crafted input could use this flaw to crash\ngrep or, potentially, read from uninitialized memory. (CVE-2015-1345)\n\nThe grep packages have been upgraded to upstream version 2.20, which\nprovides a number of bug fixes and enhancements over the previous version.\nNotably, the speed of various operations has been improved significantly.\nNow, the recursive grep utility uses the fts function of the gnulib library\nfor directory traversal, so that it can handle much larger directories\nwithout reporting the \"File name too long\" error message, and it can\noperate faster when dealing with large directory hierarchies. (BZ#982215,\nBZ#1064668, BZ#1126757, BZ#1167766, BZ#1171806)\n\nThis update also fixes the following bugs:\n\n* Prior to this update, the \\w and \\W symbols were inconsistently matched\nto the [:alnum:] character class. Consequently, regular expressions that used \\w and \\W in some cases had incorrect results. An upstream patch which fixes the matching problem has been applied, and \\w is now matched to the [_[:alnum:]] character and \\W to the [^_[:alnum:]] character consistently. (BZ#799863)\n\n* Previously, the \"--fixed-regexp\" command-line option was not included in\nthe grep(1) manual page. Consequently, the manual page was inconsistent\nwith the built-in help of the grep utility. To fix this bug, grep(1) has\nbeen updated to include a note informing the user that \"--fixed-regexp\" is\nan obsolete option. Now, the built-in help and manual page are consistent\nregarding the \"--fixed-regexp\" option. (BZ#1103270)\n\n* Previously, the Perl Compatible Regular Expression (PCRE) library did not\nwork correctly when matching non-UTF-8 text in UTF-8 mode. Consequently, an\nerror message about invalid UTF-8 byte sequence characters was returned.\nTo fix this bug, patches from upstream have been applied to the PCRE\nlibrary and the grep utility. As a result, PCRE now skips non-UTF-8\ncharacters as non-matching text without returning any error message.\n(BZ#1193030)\n\nAll grep users are advised to upgrade to these updated packages, which\ncorrect these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1447", "url": "https://access.redhat.com/errata/RHSA-2015:1447" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "799863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799863" }, { "category": "external", "summary": "889935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889935" }, { "category": "external", "summary": "982215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=982215" }, { "category": "external", "summary": "1103270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103270" }, { "category": "external", "summary": "1167766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167766" }, { "category": "external", "summary": "1171806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171806" }, { "category": "external", "summary": "1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1447.json" } ], "title": "Red Hat Security Advisory: grep security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-10-09T14:22:46+00:00", "generator": { "date": "2025-10-09T14:22:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2015:1447", "initial_release_date": "2015-07-20T14:43:55+00:00", "revision_history": [ { "date": "2015-07-20T14:43:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-07-20T14:43:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T14:22:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.i686", "product": { "name": "grep-0:2.20-3.el6.i686", "product_id": "grep-0:2.20-3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=i686" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.i686", "product": { "name": "grep-debuginfo-0:2.20-3.el6.i686", "product_id": "grep-debuginfo-0:2.20-3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.x86_64", "product": { "name": "grep-0:2.20-3.el6.x86_64", "product_id": "grep-0:2.20-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.x86_64", "product": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64", "product_id": "grep-debuginfo-0:2.20-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.src", "product": { "name": "grep-0:2.20-3.el6.src", "product_id": "grep-0:2.20-3.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.s390x", "product": { "name": "grep-0:2.20-3.el6.s390x", "product_id": "grep-0:2.20-3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=s390x" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.s390x", "product": { "name": "grep-debuginfo-0:2.20-3.el6.s390x", "product_id": "grep-debuginfo-0:2.20-3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.ppc64", "product": { "name": "grep-0:2.20-3.el6.ppc64", "product_id": "grep-0:2.20-3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.ppc64", "product": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64", "product_id": "grep-debuginfo-0:2.20-3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-5667", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2012-12-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "889935" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way grep parsed large lines of data. An attacker able to trick a user into running grep on a specially crafted data file could use this flaw to crash grep or, potentially, execute arbitrary code with the privileges of the user running grep.", "title": "Vulnerability description" }, { "category": "summary", "text": "grep: Integer overflow leading to heap-based buffer-overflow when reading large lines", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of grep as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5667" }, { "category": "external", "summary": "RHBZ#889935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889935" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5667", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5667" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5667", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5667" } ], "release_date": "2012-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-20T14:43:55+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1447" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "grep: Integer overflow leading to heap-based buffer-overflow when reading large lines" }, { "cve": "CVE-2015-1345", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1183651" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "grep: heap buffer overrun", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect versions of grep as shipped in Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1345" }, { "category": "external", "summary": "RHBZ#1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1345", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1345" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345" } ], "release_date": "2015-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-20T14:43:55+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1447" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "grep: heap buffer overrun" } ] }
RHSA-2015:2111
Vulnerability from csaf_redhat
Published
2015-11-19 03:18
Modified
2025-10-09 15:28
Summary
Red Hat Security Advisory: grep security and bug fix update
Notes
Topic
Updated grep packages that fix one security issue and several bugs are now
available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Low security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
The grep utility searches through textual input for lines that contain a
match to a specified pattern and then prints the matching lines. The GNU
grep utilities include grep, egrep, and fgrep.
A heap-based buffer overflow flaw was found in the way grep processed
certain pattern and text combinations. An attacker able to trick a user
into running grep on specially crafted input could use this flaw to crash
grep or, potentially, read from uninitialized memory. (CVE-2015-1345)
This update also fixes the following bugs:
* Prior to this update, the \w and \W symbols were inconsistently matched
to the [:alnum:] character class. Consequently, using regular expressions
with "\w" and "\W" could lead to incorrect results. With this update, "\w"
is consistently matched to the [_[:alnum:]] character, and "\W" is
consistently matched to the [^_[:alnum:]] character. (BZ#1159012)
* Previously, the Perl Compatible Regular Expression (PCRE) matcher
(selected by the "-P" parameter in grep) did not work correctly when
matching non-UTF-8 text in UTF-8 locales. Consequently, an error message
about invalid UTF-8 byte sequence characters was returned. To fix this bug,
patches from upstream have been applied to the grep utility. As a result,
PCRE now skips non-UTF-8 characters as non-matching text without returning
any error message. (BZ#1217080)
All grep users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated grep packages that fix one security issue and several bugs are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Low security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The grep utility searches through textual input for lines that contain a\nmatch to a specified pattern and then prints the matching lines. The GNU\ngrep utilities include grep, egrep, and fgrep.\n\nA heap-based buffer overflow flaw was found in the way grep processed\ncertain pattern and text combinations. An attacker able to trick a user\ninto running grep on specially crafted input could use this flaw to crash\ngrep or, potentially, read from uninitialized memory. (CVE-2015-1345)\n\nThis update also fixes the following bugs:\n\n* Prior to this update, the \\w and \\W symbols were inconsistently matched\nto the [:alnum:] character class. Consequently, using regular expressions\nwith \"\\w\" and \"\\W\" could lead to incorrect results. With this update, \"\\w\"\nis consistently matched to the [_[:alnum:]] character, and \"\\W\" is\nconsistently matched to the [^_[:alnum:]] character. (BZ#1159012)\n\n* Previously, the Perl Compatible Regular Expression (PCRE) matcher\n(selected by the \"-P\" parameter in grep) did not work correctly when\nmatching non-UTF-8 text in UTF-8 locales. Consequently, an error message\nabout invalid UTF-8 byte sequence characters was returned. To fix this bug,\npatches from upstream have been applied to the grep utility. As a result,\nPCRE now skips non-UTF-8 characters as non-matching text without returning\nany error message. (BZ#1217080)\n\nAll grep users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2111", "url": "https://access.redhat.com/errata/RHSA-2015:2111" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1103259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103259" }, { "category": "external", "summary": "1159012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159012" }, { "category": "external", "summary": "1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2111.json" } ], "title": "Red Hat Security Advisory: grep security and bug fix update", "tracking": { "current_release_date": "2025-10-09T15:28:45+00:00", "generator": { "date": "2025-10-09T15:28:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2015:2111", "initial_release_date": "2015-11-19T03:18:28+00:00", "revision_history": [ { "date": "2015-11-19T03:18:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-11-19T03:18:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T15:28:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.aarch64", "product": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64", "product_id": "grep-debuginfo-0:2.20-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "grep-0:2.20-2.el7.aarch64", "product": { "name": "grep-0:2.20-2.el7.aarch64", "product_id": "grep-0:2.20-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-2.el7.ppc64", "product": { "name": "grep-0:2.20-2.el7.ppc64", "product_id": "grep-0:2.20-2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.ppc64", "product": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64", "product_id": "grep-debuginfo-0:2.20-2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.ppc64le", "product": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le", "product_id": "grep-debuginfo-0:2.20-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "grep-0:2.20-2.el7.ppc64le", "product": { "name": "grep-0:2.20-2.el7.ppc64le", "product_id": "grep-0:2.20-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-2.el7.s390x", "product": { "name": "grep-0:2.20-2.el7.s390x", "product_id": "grep-0:2.20-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.s390x", "product": { "name": "grep-debuginfo-0:2.20-2.el7.s390x", "product_id": "grep-debuginfo-0:2.20-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.x86_64", "product": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64", "product_id": "grep-debuginfo-0:2.20-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "grep-0:2.20-2.el7.x86_64", "product": { "name": "grep-0:2.20-2.el7.x86_64", "product_id": "grep-0:2.20-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-2.el7.src", "product": { "name": "grep-0:2.20-2.el7.src", "product_id": "grep-0:2.20-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1345", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1183651" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "grep: heap buffer overrun", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect versions of grep as shipped in Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client:grep-0:2.20-2.el7.aarch64", "7Client:grep-0:2.20-2.el7.ppc64", "7Client:grep-0:2.20-2.el7.ppc64le", "7Client:grep-0:2.20-2.el7.s390x", "7Client:grep-0:2.20-2.el7.src", "7Client:grep-0:2.20-2.el7.x86_64", "7Client:grep-debuginfo-0:2.20-2.el7.aarch64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Client:grep-debuginfo-0:2.20-2.el7.s390x", "7Client:grep-debuginfo-0:2.20-2.el7.x86_64", "7ComputeNode:grep-0:2.20-2.el7.aarch64", "7ComputeNode:grep-0:2.20-2.el7.ppc64", "7ComputeNode:grep-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-0:2.20-2.el7.s390x", "7ComputeNode:grep-0:2.20-2.el7.src", "7ComputeNode:grep-0:2.20-2.el7.x86_64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64", "7Server:grep-0:2.20-2.el7.aarch64", "7Server:grep-0:2.20-2.el7.ppc64", "7Server:grep-0:2.20-2.el7.ppc64le", "7Server:grep-0:2.20-2.el7.s390x", "7Server:grep-0:2.20-2.el7.src", "7Server:grep-0:2.20-2.el7.x86_64", "7Server:grep-debuginfo-0:2.20-2.el7.aarch64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Server:grep-debuginfo-0:2.20-2.el7.s390x", "7Server:grep-debuginfo-0:2.20-2.el7.x86_64", "7Workstation:grep-0:2.20-2.el7.aarch64", "7Workstation:grep-0:2.20-2.el7.ppc64", "7Workstation:grep-0:2.20-2.el7.ppc64le", "7Workstation:grep-0:2.20-2.el7.s390x", "7Workstation:grep-0:2.20-2.el7.src", "7Workstation:grep-0:2.20-2.el7.x86_64", "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x", "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1345" }, { "category": "external", "summary": "RHBZ#1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1345", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1345" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345" } ], "release_date": "2015-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-19T03:18:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client:grep-0:2.20-2.el7.aarch64", "7Client:grep-0:2.20-2.el7.ppc64", "7Client:grep-0:2.20-2.el7.ppc64le", "7Client:grep-0:2.20-2.el7.s390x", "7Client:grep-0:2.20-2.el7.src", "7Client:grep-0:2.20-2.el7.x86_64", "7Client:grep-debuginfo-0:2.20-2.el7.aarch64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Client:grep-debuginfo-0:2.20-2.el7.s390x", "7Client:grep-debuginfo-0:2.20-2.el7.x86_64", "7ComputeNode:grep-0:2.20-2.el7.aarch64", "7ComputeNode:grep-0:2.20-2.el7.ppc64", "7ComputeNode:grep-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-0:2.20-2.el7.s390x", "7ComputeNode:grep-0:2.20-2.el7.src", "7ComputeNode:grep-0:2.20-2.el7.x86_64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64", "7Server:grep-0:2.20-2.el7.aarch64", "7Server:grep-0:2.20-2.el7.ppc64", "7Server:grep-0:2.20-2.el7.ppc64le", "7Server:grep-0:2.20-2.el7.s390x", "7Server:grep-0:2.20-2.el7.src", "7Server:grep-0:2.20-2.el7.x86_64", "7Server:grep-debuginfo-0:2.20-2.el7.aarch64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Server:grep-debuginfo-0:2.20-2.el7.s390x", "7Server:grep-debuginfo-0:2.20-2.el7.x86_64", "7Workstation:grep-0:2.20-2.el7.aarch64", "7Workstation:grep-0:2.20-2.el7.ppc64", "7Workstation:grep-0:2.20-2.el7.ppc64le", "7Workstation:grep-0:2.20-2.el7.s390x", "7Workstation:grep-0:2.20-2.el7.src", "7Workstation:grep-0:2.20-2.el7.x86_64", "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x", "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2111" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client:grep-0:2.20-2.el7.aarch64", "7Client:grep-0:2.20-2.el7.ppc64", "7Client:grep-0:2.20-2.el7.ppc64le", "7Client:grep-0:2.20-2.el7.s390x", "7Client:grep-0:2.20-2.el7.src", "7Client:grep-0:2.20-2.el7.x86_64", "7Client:grep-debuginfo-0:2.20-2.el7.aarch64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Client:grep-debuginfo-0:2.20-2.el7.s390x", "7Client:grep-debuginfo-0:2.20-2.el7.x86_64", "7ComputeNode:grep-0:2.20-2.el7.aarch64", "7ComputeNode:grep-0:2.20-2.el7.ppc64", "7ComputeNode:grep-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-0:2.20-2.el7.s390x", "7ComputeNode:grep-0:2.20-2.el7.src", "7ComputeNode:grep-0:2.20-2.el7.x86_64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64", "7Server:grep-0:2.20-2.el7.aarch64", "7Server:grep-0:2.20-2.el7.ppc64", "7Server:grep-0:2.20-2.el7.ppc64le", "7Server:grep-0:2.20-2.el7.s390x", "7Server:grep-0:2.20-2.el7.src", "7Server:grep-0:2.20-2.el7.x86_64", "7Server:grep-debuginfo-0:2.20-2.el7.aarch64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Server:grep-debuginfo-0:2.20-2.el7.s390x", "7Server:grep-debuginfo-0:2.20-2.el7.x86_64", "7Workstation:grep-0:2.20-2.el7.aarch64", "7Workstation:grep-0:2.20-2.el7.ppc64", "7Workstation:grep-0:2.20-2.el7.ppc64le", "7Workstation:grep-0:2.20-2.el7.s390x", "7Workstation:grep-0:2.20-2.el7.src", "7Workstation:grep-0:2.20-2.el7.x86_64", "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x", "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "grep: heap buffer overrun" } ] }
rhsa-2015:1447
Vulnerability from csaf_redhat
Published
2015-07-20 14:43
Modified
2025-10-09 14:22
Summary
Red Hat Security Advisory: grep security, bug fix, and enhancement update
Notes
Topic
Updated grep packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Low security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
The grep utility searches through textual input for lines that contain a
match to a specified pattern and then prints the matching lines. The GNU
grep utilities include grep, egrep, and fgrep.
An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way grep parsed large lines of data. An attacker able to trick
a user into running grep on a specially crafted data file could use this
flaw to crash grep or, potentially, execute arbitrary code with the
privileges of the user running grep. (CVE-2012-5667)
A heap-based buffer overflow flaw was found in the way grep processed
certain pattern and text combinations. An attacker able to trick a user
into running grep on specially crafted input could use this flaw to crash
grep or, potentially, read from uninitialized memory. (CVE-2015-1345)
The grep packages have been upgraded to upstream version 2.20, which
provides a number of bug fixes and enhancements over the previous version.
Notably, the speed of various operations has been improved significantly.
Now, the recursive grep utility uses the fts function of the gnulib library
for directory traversal, so that it can handle much larger directories
without reporting the "File name too long" error message, and it can
operate faster when dealing with large directory hierarchies. (BZ#982215,
BZ#1064668, BZ#1126757, BZ#1167766, BZ#1171806)
This update also fixes the following bugs:
* Prior to this update, the \w and \W symbols were inconsistently matched
to the [:alnum:] character class. Consequently, regular expressions that used \w and \W in some cases had incorrect results. An upstream patch which fixes the matching problem has been applied, and \w is now matched to the [_[:alnum:]] character and \W to the [^_[:alnum:]] character consistently. (BZ#799863)
* Previously, the "--fixed-regexp" command-line option was not included in
the grep(1) manual page. Consequently, the manual page was inconsistent
with the built-in help of the grep utility. To fix this bug, grep(1) has
been updated to include a note informing the user that "--fixed-regexp" is
an obsolete option. Now, the built-in help and manual page are consistent
regarding the "--fixed-regexp" option. (BZ#1103270)
* Previously, the Perl Compatible Regular Expression (PCRE) library did not
work correctly when matching non-UTF-8 text in UTF-8 mode. Consequently, an
error message about invalid UTF-8 byte sequence characters was returned.
To fix this bug, patches from upstream have been applied to the PCRE
library and the grep utility. As a result, PCRE now skips non-UTF-8
characters as non-matching text without returning any error message.
(BZ#1193030)
All grep users are advised to upgrade to these updated packages, which
correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated grep packages that fix two security issues, several bugs, and add\nvarious enhancements are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Low security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The grep utility searches through textual input for lines that contain a\nmatch to a specified pattern and then prints the matching lines. The GNU\ngrep utilities include grep, egrep, and fgrep.\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way grep parsed large lines of data. An attacker able to trick\na user into running grep on a specially crafted data file could use this\nflaw to crash grep or, potentially, execute arbitrary code with the\nprivileges of the user running grep. (CVE-2012-5667)\n\nA heap-based buffer overflow flaw was found in the way grep processed\ncertain pattern and text combinations. An attacker able to trick a user\ninto running grep on specially crafted input could use this flaw to crash\ngrep or, potentially, read from uninitialized memory. (CVE-2015-1345)\n\nThe grep packages have been upgraded to upstream version 2.20, which\nprovides a number of bug fixes and enhancements over the previous version.\nNotably, the speed of various operations has been improved significantly.\nNow, the recursive grep utility uses the fts function of the gnulib library\nfor directory traversal, so that it can handle much larger directories\nwithout reporting the \"File name too long\" error message, and it can\noperate faster when dealing with large directory hierarchies. (BZ#982215,\nBZ#1064668, BZ#1126757, BZ#1167766, BZ#1171806)\n\nThis update also fixes the following bugs:\n\n* Prior to this update, the \\w and \\W symbols were inconsistently matched\nto the [:alnum:] character class. Consequently, regular expressions that used \\w and \\W in some cases had incorrect results. An upstream patch which fixes the matching problem has been applied, and \\w is now matched to the [_[:alnum:]] character and \\W to the [^_[:alnum:]] character consistently. (BZ#799863)\n\n* Previously, the \"--fixed-regexp\" command-line option was not included in\nthe grep(1) manual page. Consequently, the manual page was inconsistent\nwith the built-in help of the grep utility. To fix this bug, grep(1) has\nbeen updated to include a note informing the user that \"--fixed-regexp\" is\nan obsolete option. Now, the built-in help and manual page are consistent\nregarding the \"--fixed-regexp\" option. (BZ#1103270)\n\n* Previously, the Perl Compatible Regular Expression (PCRE) library did not\nwork correctly when matching non-UTF-8 text in UTF-8 mode. Consequently, an\nerror message about invalid UTF-8 byte sequence characters was returned.\nTo fix this bug, patches from upstream have been applied to the PCRE\nlibrary and the grep utility. As a result, PCRE now skips non-UTF-8\ncharacters as non-matching text without returning any error message.\n(BZ#1193030)\n\nAll grep users are advised to upgrade to these updated packages, which\ncorrect these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1447", "url": "https://access.redhat.com/errata/RHSA-2015:1447" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "799863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799863" }, { "category": "external", "summary": "889935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889935" }, { "category": "external", "summary": "982215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=982215" }, { "category": "external", "summary": "1103270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103270" }, { "category": "external", "summary": "1167766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167766" }, { "category": "external", "summary": "1171806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171806" }, { "category": "external", "summary": "1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1447.json" } ], "title": "Red Hat Security Advisory: grep security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-10-09T14:22:46+00:00", "generator": { "date": "2025-10-09T14:22:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2015:1447", "initial_release_date": "2015-07-20T14:43:55+00:00", "revision_history": [ { "date": "2015-07-20T14:43:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-07-20T14:43:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T14:22:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.i686", "product": { "name": "grep-0:2.20-3.el6.i686", "product_id": "grep-0:2.20-3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=i686" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.i686", "product": { "name": "grep-debuginfo-0:2.20-3.el6.i686", "product_id": "grep-debuginfo-0:2.20-3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.x86_64", "product": { "name": "grep-0:2.20-3.el6.x86_64", "product_id": "grep-0:2.20-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.x86_64", "product": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64", "product_id": "grep-debuginfo-0:2.20-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.src", "product": { "name": "grep-0:2.20-3.el6.src", "product_id": "grep-0:2.20-3.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.s390x", "product": { "name": "grep-0:2.20-3.el6.s390x", "product_id": "grep-0:2.20-3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=s390x" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.s390x", "product": { "name": "grep-debuginfo-0:2.20-3.el6.s390x", "product_id": "grep-debuginfo-0:2.20-3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.ppc64", "product": { "name": "grep-0:2.20-3.el6.ppc64", "product_id": "grep-0:2.20-3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.ppc64", "product": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64", "product_id": "grep-debuginfo-0:2.20-3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-5667", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2012-12-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "889935" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way grep parsed large lines of data. An attacker able to trick a user into running grep on a specially crafted data file could use this flaw to crash grep or, potentially, execute arbitrary code with the privileges of the user running grep.", "title": "Vulnerability description" }, { "category": "summary", "text": "grep: Integer overflow leading to heap-based buffer-overflow when reading large lines", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of grep as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5667" }, { "category": "external", "summary": "RHBZ#889935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889935" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5667", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5667" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5667", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5667" } ], "release_date": "2012-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-20T14:43:55+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1447" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "grep: Integer overflow leading to heap-based buffer-overflow when reading large lines" }, { "cve": "CVE-2015-1345", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1183651" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "grep: heap buffer overrun", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect versions of grep as shipped in Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1345" }, { "category": "external", "summary": "RHBZ#1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1345", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1345" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345" } ], "release_date": "2015-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-20T14:43:55+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1447" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "grep: heap buffer overrun" } ] }
rhsa-2015:2111
Vulnerability from csaf_redhat
Published
2015-11-19 03:18
Modified
2025-10-09 15:28
Summary
Red Hat Security Advisory: grep security and bug fix update
Notes
Topic
Updated grep packages that fix one security issue and several bugs are now
available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Low security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
The grep utility searches through textual input for lines that contain a
match to a specified pattern and then prints the matching lines. The GNU
grep utilities include grep, egrep, and fgrep.
A heap-based buffer overflow flaw was found in the way grep processed
certain pattern and text combinations. An attacker able to trick a user
into running grep on specially crafted input could use this flaw to crash
grep or, potentially, read from uninitialized memory. (CVE-2015-1345)
This update also fixes the following bugs:
* Prior to this update, the \w and \W symbols were inconsistently matched
to the [:alnum:] character class. Consequently, using regular expressions
with "\w" and "\W" could lead to incorrect results. With this update, "\w"
is consistently matched to the [_[:alnum:]] character, and "\W" is
consistently matched to the [^_[:alnum:]] character. (BZ#1159012)
* Previously, the Perl Compatible Regular Expression (PCRE) matcher
(selected by the "-P" parameter in grep) did not work correctly when
matching non-UTF-8 text in UTF-8 locales. Consequently, an error message
about invalid UTF-8 byte sequence characters was returned. To fix this bug,
patches from upstream have been applied to the grep utility. As a result,
PCRE now skips non-UTF-8 characters as non-matching text without returning
any error message. (BZ#1217080)
All grep users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated grep packages that fix one security issue and several bugs are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Low security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The grep utility searches through textual input for lines that contain a\nmatch to a specified pattern and then prints the matching lines. The GNU\ngrep utilities include grep, egrep, and fgrep.\n\nA heap-based buffer overflow flaw was found in the way grep processed\ncertain pattern and text combinations. An attacker able to trick a user\ninto running grep on specially crafted input could use this flaw to crash\ngrep or, potentially, read from uninitialized memory. (CVE-2015-1345)\n\nThis update also fixes the following bugs:\n\n* Prior to this update, the \\w and \\W symbols were inconsistently matched\nto the [:alnum:] character class. Consequently, using regular expressions\nwith \"\\w\" and \"\\W\" could lead to incorrect results. With this update, \"\\w\"\nis consistently matched to the [_[:alnum:]] character, and \"\\W\" is\nconsistently matched to the [^_[:alnum:]] character. (BZ#1159012)\n\n* Previously, the Perl Compatible Regular Expression (PCRE) matcher\n(selected by the \"-P\" parameter in grep) did not work correctly when\nmatching non-UTF-8 text in UTF-8 locales. Consequently, an error message\nabout invalid UTF-8 byte sequence characters was returned. To fix this bug,\npatches from upstream have been applied to the grep utility. As a result,\nPCRE now skips non-UTF-8 characters as non-matching text without returning\nany error message. (BZ#1217080)\n\nAll grep users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2111", "url": "https://access.redhat.com/errata/RHSA-2015:2111" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1103259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103259" }, { "category": "external", "summary": "1159012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159012" }, { "category": "external", "summary": "1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2111.json" } ], "title": "Red Hat Security Advisory: grep security and bug fix update", "tracking": { "current_release_date": "2025-10-09T15:28:45+00:00", "generator": { "date": "2025-10-09T15:28:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2015:2111", "initial_release_date": "2015-11-19T03:18:28+00:00", "revision_history": [ { "date": "2015-11-19T03:18:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-11-19T03:18:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T15:28:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.aarch64", "product": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64", "product_id": "grep-debuginfo-0:2.20-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "grep-0:2.20-2.el7.aarch64", "product": { "name": "grep-0:2.20-2.el7.aarch64", "product_id": "grep-0:2.20-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-2.el7.ppc64", "product": { "name": "grep-0:2.20-2.el7.ppc64", "product_id": "grep-0:2.20-2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.ppc64", "product": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64", "product_id": "grep-debuginfo-0:2.20-2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.ppc64le", "product": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le", "product_id": "grep-debuginfo-0:2.20-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "grep-0:2.20-2.el7.ppc64le", "product": { "name": "grep-0:2.20-2.el7.ppc64le", "product_id": "grep-0:2.20-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-2.el7.s390x", "product": { "name": "grep-0:2.20-2.el7.s390x", "product_id": "grep-0:2.20-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.s390x", "product": { "name": "grep-debuginfo-0:2.20-2.el7.s390x", "product_id": "grep-debuginfo-0:2.20-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.x86_64", "product": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64", "product_id": "grep-debuginfo-0:2.20-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "grep-0:2.20-2.el7.x86_64", "product": { "name": "grep-0:2.20-2.el7.x86_64", "product_id": "grep-0:2.20-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-2.el7.src", "product": { "name": "grep-0:2.20-2.el7.src", "product_id": "grep-0:2.20-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1345", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1183651" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "grep: heap buffer overrun", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect versions of grep as shipped in Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client:grep-0:2.20-2.el7.aarch64", "7Client:grep-0:2.20-2.el7.ppc64", "7Client:grep-0:2.20-2.el7.ppc64le", "7Client:grep-0:2.20-2.el7.s390x", "7Client:grep-0:2.20-2.el7.src", "7Client:grep-0:2.20-2.el7.x86_64", "7Client:grep-debuginfo-0:2.20-2.el7.aarch64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Client:grep-debuginfo-0:2.20-2.el7.s390x", "7Client:grep-debuginfo-0:2.20-2.el7.x86_64", "7ComputeNode:grep-0:2.20-2.el7.aarch64", "7ComputeNode:grep-0:2.20-2.el7.ppc64", "7ComputeNode:grep-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-0:2.20-2.el7.s390x", "7ComputeNode:grep-0:2.20-2.el7.src", "7ComputeNode:grep-0:2.20-2.el7.x86_64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64", "7Server:grep-0:2.20-2.el7.aarch64", "7Server:grep-0:2.20-2.el7.ppc64", "7Server:grep-0:2.20-2.el7.ppc64le", "7Server:grep-0:2.20-2.el7.s390x", "7Server:grep-0:2.20-2.el7.src", "7Server:grep-0:2.20-2.el7.x86_64", "7Server:grep-debuginfo-0:2.20-2.el7.aarch64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Server:grep-debuginfo-0:2.20-2.el7.s390x", "7Server:grep-debuginfo-0:2.20-2.el7.x86_64", "7Workstation:grep-0:2.20-2.el7.aarch64", "7Workstation:grep-0:2.20-2.el7.ppc64", "7Workstation:grep-0:2.20-2.el7.ppc64le", "7Workstation:grep-0:2.20-2.el7.s390x", "7Workstation:grep-0:2.20-2.el7.src", "7Workstation:grep-0:2.20-2.el7.x86_64", "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x", "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1345" }, { "category": "external", "summary": "RHBZ#1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1345", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1345" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345" } ], "release_date": "2015-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-19T03:18:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client:grep-0:2.20-2.el7.aarch64", "7Client:grep-0:2.20-2.el7.ppc64", "7Client:grep-0:2.20-2.el7.ppc64le", "7Client:grep-0:2.20-2.el7.s390x", "7Client:grep-0:2.20-2.el7.src", "7Client:grep-0:2.20-2.el7.x86_64", "7Client:grep-debuginfo-0:2.20-2.el7.aarch64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Client:grep-debuginfo-0:2.20-2.el7.s390x", "7Client:grep-debuginfo-0:2.20-2.el7.x86_64", "7ComputeNode:grep-0:2.20-2.el7.aarch64", "7ComputeNode:grep-0:2.20-2.el7.ppc64", "7ComputeNode:grep-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-0:2.20-2.el7.s390x", "7ComputeNode:grep-0:2.20-2.el7.src", "7ComputeNode:grep-0:2.20-2.el7.x86_64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64", "7Server:grep-0:2.20-2.el7.aarch64", "7Server:grep-0:2.20-2.el7.ppc64", "7Server:grep-0:2.20-2.el7.ppc64le", "7Server:grep-0:2.20-2.el7.s390x", "7Server:grep-0:2.20-2.el7.src", "7Server:grep-0:2.20-2.el7.x86_64", "7Server:grep-debuginfo-0:2.20-2.el7.aarch64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Server:grep-debuginfo-0:2.20-2.el7.s390x", "7Server:grep-debuginfo-0:2.20-2.el7.x86_64", "7Workstation:grep-0:2.20-2.el7.aarch64", "7Workstation:grep-0:2.20-2.el7.ppc64", "7Workstation:grep-0:2.20-2.el7.ppc64le", "7Workstation:grep-0:2.20-2.el7.s390x", "7Workstation:grep-0:2.20-2.el7.src", "7Workstation:grep-0:2.20-2.el7.x86_64", "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x", "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2111" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client:grep-0:2.20-2.el7.aarch64", "7Client:grep-0:2.20-2.el7.ppc64", "7Client:grep-0:2.20-2.el7.ppc64le", "7Client:grep-0:2.20-2.el7.s390x", "7Client:grep-0:2.20-2.el7.src", "7Client:grep-0:2.20-2.el7.x86_64", "7Client:grep-debuginfo-0:2.20-2.el7.aarch64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Client:grep-debuginfo-0:2.20-2.el7.s390x", "7Client:grep-debuginfo-0:2.20-2.el7.x86_64", "7ComputeNode:grep-0:2.20-2.el7.aarch64", "7ComputeNode:grep-0:2.20-2.el7.ppc64", "7ComputeNode:grep-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-0:2.20-2.el7.s390x", "7ComputeNode:grep-0:2.20-2.el7.src", "7ComputeNode:grep-0:2.20-2.el7.x86_64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64", "7Server:grep-0:2.20-2.el7.aarch64", "7Server:grep-0:2.20-2.el7.ppc64", "7Server:grep-0:2.20-2.el7.ppc64le", "7Server:grep-0:2.20-2.el7.s390x", "7Server:grep-0:2.20-2.el7.src", "7Server:grep-0:2.20-2.el7.x86_64", "7Server:grep-debuginfo-0:2.20-2.el7.aarch64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Server:grep-debuginfo-0:2.20-2.el7.s390x", "7Server:grep-debuginfo-0:2.20-2.el7.x86_64", "7Workstation:grep-0:2.20-2.el7.aarch64", "7Workstation:grep-0:2.20-2.el7.ppc64", "7Workstation:grep-0:2.20-2.el7.ppc64le", "7Workstation:grep-0:2.20-2.el7.s390x", "7Workstation:grep-0:2.20-2.el7.src", "7Workstation:grep-0:2.20-2.el7.x86_64", "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x", "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "grep: heap buffer overrun" } ] }
fkie_cve-2015-1345
Vulnerability from fkie_nvd
Published
2015-02-12 16:59
Modified
2025-04-12 10:46
Severity ?
Summary
The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
References
URL | Tags | ||
---|---|---|---|
cve@mitre.org | http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563 | Exploit | |
cve@mitre.org | http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2015-1447.html | ||
cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/01/22/10 | ||
cve@mitre.org | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/72281 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1447.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/01/22/10 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/72281 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:grep:2.19:*:*:*:*:*:*:*", "matchCriteriaId": "BF781F3D-AE9F-47BF-95A6-004A5D89F870", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:grep:2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6952087B-9AD8-4616-866D-F99C286FA785", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:grep:2.21:*:*:*:*:*:*:*", "matchCriteriaId": "7CFADBFF-B026-47C1-857D-DB945D0BFBBF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option." }, { "lang": "es", "value": "La funci\u00f3n bmexec_trans en kwset.c en grep 2.19 hasta 2.21 permite a usuarios locales causar una denegaci\u00f3n de servicio (lectura de la memoria din\u00e1mica fuera de rango y ca\u00edda) a trav\u00e9s de entradas manipuladas cuando se utiliza la opci\u00f3n -F." } ], "id": "CVE-2015-1345", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-02-12T16:59:03.707", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563" }, { "source": "cve@mitre.org", "url": "http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1447.html" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/01/22/10" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/72281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1447.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/01/22/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72281" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-5wcr-xg97-jwqq
Vulnerability from github
Published
2022-05-14 02:06
Modified
2022-05-14 02:06
VLAI Severity ?
Details
The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
{ "affected": [], "aliases": [ "CVE-2015-1345" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-02-12T16:59:00Z", "severity": "LOW" }, "details": "The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.", "id": "GHSA-5wcr-xg97-jwqq", "modified": "2022-05-14T02:06:47Z", "published": "2022-05-14T02:06:47Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345" }, { "type": "WEB", "url": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563" }, { "type": "WEB", "url": "http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1447.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2015/01/22/10" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/72281" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2015-1345
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-1345", "description": "The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.", "id": "GSD-2015-1345", "references": [ "https://www.suse.com/security/cve/CVE-2015-1345.html", "https://access.redhat.com/errata/RHSA-2015:2111", "https://access.redhat.com/errata/RHSA-2015:1447", "https://alas.aws.amazon.com/cve/html/CVE-2015-1345.html", "https://linux.oracle.com/cve/CVE-2015-1345.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-1345" ], "details": "The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.", "id": "GSD-2015-1345", "modified": "2023-12-13T01:20:05.799611Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1345", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563", "refsource": "CONFIRM", "url": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "RHSA-2015:1447", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1447.html" }, { "name": "openSUSE-SU-2015:0243", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html" }, { "name": "72281", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72281" }, { "name": "[oss-security] 20150122 Re: CVE request: grep heap buffer overrun", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/22/10" }, { "name": "http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:grep:2.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:grep:2.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:grep:2.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1345" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2015:0243", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html" }, { "name": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563", "refsource": "CONFIRM", "tags": [ "Exploit" ], "url": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563" }, { "name": "[oss-security] 20150122 Re: CVE request: grep heap buffer overrun", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2015/01/22/10" }, { "name": "http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2", "refsource": "CONFIRM", "tags": [], "url": "http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "72281", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/72281" }, { "name": "RHSA-2015:1447", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1447.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-30T16:27Z", "publishedDate": "2015-02-12T16:59Z" } } }
opensuse-su-2024:10248-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
grep-2.27-2.1 on GA media
Notes
Title of the patch
grep-2.27-2.1 on GA media
Description of the patch
These are all security issues fixed in the grep-2.27-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10248
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "grep-2.27-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the grep-2.27-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10248", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10248-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1345 page", "url": "https://www.suse.com/security/cve/CVE-2015-1345/" } ], "title": "grep-2.27-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10248-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "grep-2.27-2.1.aarch64", "product": { "name": "grep-2.27-2.1.aarch64", "product_id": "grep-2.27-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "grep-2.27-2.1.ppc64le", "product": { "name": "grep-2.27-2.1.ppc64le", "product_id": "grep-2.27-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "grep-2.27-2.1.s390x", "product": { "name": "grep-2.27-2.1.s390x", "product_id": "grep-2.27-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grep-2.27-2.1.x86_64", "product": { "name": "grep-2.27-2.1.x86_64", "product_id": "grep-2.27-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grep-2.27-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grep-2.27-2.1.aarch64" }, "product_reference": "grep-2.27-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grep-2.27-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grep-2.27-2.1.ppc64le" }, "product_reference": "grep-2.27-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grep-2.27-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grep-2.27-2.1.s390x" }, "product_reference": "grep-2.27-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grep-2.27-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grep-2.27-2.1.x86_64" }, "product_reference": "grep-2.27-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1345" } ], "notes": [ { "category": "general", "text": "The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:grep-2.27-2.1.aarch64", "openSUSE Tumbleweed:grep-2.27-2.1.ppc64le", "openSUSE Tumbleweed:grep-2.27-2.1.s390x", "openSUSE Tumbleweed:grep-2.27-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1345", "url": "https://www.suse.com/security/cve/CVE-2015-1345" }, { "category": "external", "summary": "SUSE Bug 914695 for CVE-2015-1345", "url": "https://bugzilla.suse.com/914695" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:grep-2.27-2.1.aarch64", "openSUSE Tumbleweed:grep-2.27-2.1.ppc64le", "openSUSE Tumbleweed:grep-2.27-2.1.s390x", "openSUSE Tumbleweed:grep-2.27-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-1345" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…