rhsa-2015:1447
Vulnerability from csaf_redhat
Published
2015-07-20 14:43
Modified
2025-10-09 14:22
Summary
Red Hat Security Advisory: grep security, bug fix, and enhancement update
Notes
Topic
Updated grep packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Low security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
The grep utility searches through textual input for lines that contain a
match to a specified pattern and then prints the matching lines. The GNU
grep utilities include grep, egrep, and fgrep.
An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way grep parsed large lines of data. An attacker able to trick
a user into running grep on a specially crafted data file could use this
flaw to crash grep or, potentially, execute arbitrary code with the
privileges of the user running grep. (CVE-2012-5667)
A heap-based buffer overflow flaw was found in the way grep processed
certain pattern and text combinations. An attacker able to trick a user
into running grep on specially crafted input could use this flaw to crash
grep or, potentially, read from uninitialized memory. (CVE-2015-1345)
The grep packages have been upgraded to upstream version 2.20, which
provides a number of bug fixes and enhancements over the previous version.
Notably, the speed of various operations has been improved significantly.
Now, the recursive grep utility uses the fts function of the gnulib library
for directory traversal, so that it can handle much larger directories
without reporting the "File name too long" error message, and it can
operate faster when dealing with large directory hierarchies. (BZ#982215,
BZ#1064668, BZ#1126757, BZ#1167766, BZ#1171806)
This update also fixes the following bugs:
* Prior to this update, the \w and \W symbols were inconsistently matched
to the [:alnum:] character class. Consequently, regular expressions that used \w and \W in some cases had incorrect results. An upstream patch which fixes the matching problem has been applied, and \w is now matched to the [_[:alnum:]] character and \W to the [^_[:alnum:]] character consistently. (BZ#799863)
* Previously, the "--fixed-regexp" command-line option was not included in
the grep(1) manual page. Consequently, the manual page was inconsistent
with the built-in help of the grep utility. To fix this bug, grep(1) has
been updated to include a note informing the user that "--fixed-regexp" is
an obsolete option. Now, the built-in help and manual page are consistent
regarding the "--fixed-regexp" option. (BZ#1103270)
* Previously, the Perl Compatible Regular Expression (PCRE) library did not
work correctly when matching non-UTF-8 text in UTF-8 mode. Consequently, an
error message about invalid UTF-8 byte sequence characters was returned.
To fix this bug, patches from upstream have been applied to the PCRE
library and the grep utility. As a result, PCRE now skips non-UTF-8
characters as non-matching text without returning any error message.
(BZ#1193030)
All grep users are advised to upgrade to these updated packages, which
correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated grep packages that fix two security issues, several bugs, and add\nvarious enhancements are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Low security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The grep utility searches through textual input for lines that contain a\nmatch to a specified pattern and then prints the matching lines. The GNU\ngrep utilities include grep, egrep, and fgrep.\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way grep parsed large lines of data. An attacker able to trick\na user into running grep on a specially crafted data file could use this\nflaw to crash grep or, potentially, execute arbitrary code with the\nprivileges of the user running grep. (CVE-2012-5667)\n\nA heap-based buffer overflow flaw was found in the way grep processed\ncertain pattern and text combinations. An attacker able to trick a user\ninto running grep on specially crafted input could use this flaw to crash\ngrep or, potentially, read from uninitialized memory. (CVE-2015-1345)\n\nThe grep packages have been upgraded to upstream version 2.20, which\nprovides a number of bug fixes and enhancements over the previous version.\nNotably, the speed of various operations has been improved significantly.\nNow, the recursive grep utility uses the fts function of the gnulib library\nfor directory traversal, so that it can handle much larger directories\nwithout reporting the \"File name too long\" error message, and it can\noperate faster when dealing with large directory hierarchies. (BZ#982215,\nBZ#1064668, BZ#1126757, BZ#1167766, BZ#1171806)\n\nThis update also fixes the following bugs:\n\n* Prior to this update, the \\w and \\W symbols were inconsistently matched\nto the [:alnum:] character class. Consequently, regular expressions that used \\w and \\W in some cases had incorrect results. An upstream patch which fixes the matching problem has been applied, and \\w is now matched to the [_[:alnum:]] character and \\W to the [^_[:alnum:]] character consistently. (BZ#799863)\n\n* Previously, the \"--fixed-regexp\" command-line option was not included in\nthe grep(1) manual page. Consequently, the manual page was inconsistent\nwith the built-in help of the grep utility. To fix this bug, grep(1) has\nbeen updated to include a note informing the user that \"--fixed-regexp\" is\nan obsolete option. Now, the built-in help and manual page are consistent\nregarding the \"--fixed-regexp\" option. (BZ#1103270)\n\n* Previously, the Perl Compatible Regular Expression (PCRE) library did not\nwork correctly when matching non-UTF-8 text in UTF-8 mode. Consequently, an\nerror message about invalid UTF-8 byte sequence characters was returned.\nTo fix this bug, patches from upstream have been applied to the PCRE\nlibrary and the grep utility. As a result, PCRE now skips non-UTF-8\ncharacters as non-matching text without returning any error message.\n(BZ#1193030)\n\nAll grep users are advised to upgrade to these updated packages, which\ncorrect these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1447", "url": "https://access.redhat.com/errata/RHSA-2015:1447" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "799863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799863" }, { "category": "external", "summary": "889935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889935" }, { "category": "external", "summary": "982215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=982215" }, { "category": "external", "summary": "1103270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103270" }, { "category": "external", "summary": "1167766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167766" }, { "category": "external", "summary": "1171806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171806" }, { "category": "external", "summary": "1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1447.json" } ], "title": "Red Hat Security Advisory: grep security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-10-09T14:22:46+00:00", "generator": { "date": "2025-10-09T14:22:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2015:1447", "initial_release_date": "2015-07-20T14:43:55+00:00", "revision_history": [ { "date": "2015-07-20T14:43:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-07-20T14:43:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T14:22:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.i686", "product": { "name": "grep-0:2.20-3.el6.i686", "product_id": "grep-0:2.20-3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=i686" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.i686", "product": { "name": "grep-debuginfo-0:2.20-3.el6.i686", "product_id": "grep-debuginfo-0:2.20-3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.x86_64", "product": { "name": "grep-0:2.20-3.el6.x86_64", "product_id": "grep-0:2.20-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.x86_64", "product": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64", "product_id": "grep-debuginfo-0:2.20-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.src", "product": { "name": "grep-0:2.20-3.el6.src", "product_id": "grep-0:2.20-3.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.s390x", "product": { "name": "grep-0:2.20-3.el6.s390x", "product_id": "grep-0:2.20-3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=s390x" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.s390x", "product": { "name": "grep-debuginfo-0:2.20-3.el6.s390x", "product_id": "grep-debuginfo-0:2.20-3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-3.el6.ppc64", "product": { "name": "grep-0:2.20-3.el6.ppc64", "product_id": "grep-0:2.20-3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-3.el6.ppc64", "product": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64", "product_id": "grep-debuginfo-0:2.20-3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-3.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.i686" }, "product_reference": "grep-0:2.20-3.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.ppc64" }, "product_reference": "grep-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.s390x" }, "product_reference": "grep-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.src" }, "product_reference": "grep-0:2.20-3.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-0:2.20-3.el6.x86_64" }, "product_reference": "grep-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.i686" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-3.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-5667", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2012-12-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "889935" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way grep parsed large lines of data. An attacker able to trick a user into running grep on a specially crafted data file could use this flaw to crash grep or, potentially, execute arbitrary code with the privileges of the user running grep.", "title": "Vulnerability description" }, { "category": "summary", "text": "grep: Integer overflow leading to heap-based buffer-overflow when reading large lines", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of grep as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5667" }, { "category": "external", "summary": "RHBZ#889935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889935" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5667", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5667" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5667", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5667" } ], "release_date": "2012-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-20T14:43:55+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1447" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "grep: Integer overflow leading to heap-based buffer-overflow when reading large lines" }, { "cve": "CVE-2015-1345", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1183651" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "grep: heap buffer overrun", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect versions of grep as shipped in Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1345" }, { "category": "external", "summary": "RHBZ#1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1345", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1345" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345" } ], "release_date": "2015-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-20T14:43:55+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1447" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client:grep-0:2.20-3.el6.i686", "6Client:grep-0:2.20-3.el6.ppc64", "6Client:grep-0:2.20-3.el6.s390x", "6Client:grep-0:2.20-3.el6.src", "6Client:grep-0:2.20-3.el6.x86_64", "6Client:grep-debuginfo-0:2.20-3.el6.i686", "6Client:grep-debuginfo-0:2.20-3.el6.ppc64", "6Client:grep-debuginfo-0:2.20-3.el6.s390x", "6Client:grep-debuginfo-0:2.20-3.el6.x86_64", "6ComputeNode:grep-0:2.20-3.el6.i686", "6ComputeNode:grep-0:2.20-3.el6.ppc64", "6ComputeNode:grep-0:2.20-3.el6.s390x", "6ComputeNode:grep-0:2.20-3.el6.src", "6ComputeNode:grep-0:2.20-3.el6.x86_64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.i686", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.ppc64", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.s390x", "6ComputeNode:grep-debuginfo-0:2.20-3.el6.x86_64", "6Server:grep-0:2.20-3.el6.i686", "6Server:grep-0:2.20-3.el6.ppc64", "6Server:grep-0:2.20-3.el6.s390x", "6Server:grep-0:2.20-3.el6.src", "6Server:grep-0:2.20-3.el6.x86_64", "6Server:grep-debuginfo-0:2.20-3.el6.i686", "6Server:grep-debuginfo-0:2.20-3.el6.ppc64", "6Server:grep-debuginfo-0:2.20-3.el6.s390x", "6Server:grep-debuginfo-0:2.20-3.el6.x86_64", "6Workstation:grep-0:2.20-3.el6.i686", "6Workstation:grep-0:2.20-3.el6.ppc64", "6Workstation:grep-0:2.20-3.el6.s390x", "6Workstation:grep-0:2.20-3.el6.src", "6Workstation:grep-0:2.20-3.el6.x86_64", "6Workstation:grep-debuginfo-0:2.20-3.el6.i686", "6Workstation:grep-debuginfo-0:2.20-3.el6.ppc64", "6Workstation:grep-debuginfo-0:2.20-3.el6.s390x", "6Workstation:grep-debuginfo-0:2.20-3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "grep: heap buffer overrun" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…