rhsa-2015:2111
Vulnerability from csaf_redhat
Published
2015-11-19 03:18
Modified
2025-10-09 15:28
Summary
Red Hat Security Advisory: grep security and bug fix update
Notes
Topic
Updated grep packages that fix one security issue and several bugs are now
available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Low security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
The grep utility searches through textual input for lines that contain a
match to a specified pattern and then prints the matching lines. The GNU
grep utilities include grep, egrep, and fgrep.
A heap-based buffer overflow flaw was found in the way grep processed
certain pattern and text combinations. An attacker able to trick a user
into running grep on specially crafted input could use this flaw to crash
grep or, potentially, read from uninitialized memory. (CVE-2015-1345)
This update also fixes the following bugs:
* Prior to this update, the \w and \W symbols were inconsistently matched
to the [:alnum:] character class. Consequently, using regular expressions
with "\w" and "\W" could lead to incorrect results. With this update, "\w"
is consistently matched to the [_[:alnum:]] character, and "\W" is
consistently matched to the [^_[:alnum:]] character. (BZ#1159012)
* Previously, the Perl Compatible Regular Expression (PCRE) matcher
(selected by the "-P" parameter in grep) did not work correctly when
matching non-UTF-8 text in UTF-8 locales. Consequently, an error message
about invalid UTF-8 byte sequence characters was returned. To fix this bug,
patches from upstream have been applied to the grep utility. As a result,
PCRE now skips non-UTF-8 characters as non-matching text without returning
any error message. (BZ#1217080)
All grep users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated grep packages that fix one security issue and several bugs are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Low security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The grep utility searches through textual input for lines that contain a\nmatch to a specified pattern and then prints the matching lines. The GNU\ngrep utilities include grep, egrep, and fgrep.\n\nA heap-based buffer overflow flaw was found in the way grep processed\ncertain pattern and text combinations. An attacker able to trick a user\ninto running grep on specially crafted input could use this flaw to crash\ngrep or, potentially, read from uninitialized memory. (CVE-2015-1345)\n\nThis update also fixes the following bugs:\n\n* Prior to this update, the \\w and \\W symbols were inconsistently matched\nto the [:alnum:] character class. Consequently, using regular expressions\nwith \"\\w\" and \"\\W\" could lead to incorrect results. With this update, \"\\w\"\nis consistently matched to the [_[:alnum:]] character, and \"\\W\" is\nconsistently matched to the [^_[:alnum:]] character. (BZ#1159012)\n\n* Previously, the Perl Compatible Regular Expression (PCRE) matcher\n(selected by the \"-P\" parameter in grep) did not work correctly when\nmatching non-UTF-8 text in UTF-8 locales. Consequently, an error message\nabout invalid UTF-8 byte sequence characters was returned. To fix this bug,\npatches from upstream have been applied to the grep utility. As a result,\nPCRE now skips non-UTF-8 characters as non-matching text without returning\nany error message. (BZ#1217080)\n\nAll grep users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2111", "url": "https://access.redhat.com/errata/RHSA-2015:2111" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1103259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103259" }, { "category": "external", "summary": "1159012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159012" }, { "category": "external", "summary": "1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2111.json" } ], "title": "Red Hat Security Advisory: grep security and bug fix update", "tracking": { "current_release_date": "2025-10-09T15:28:45+00:00", "generator": { "date": "2025-10-09T15:28:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2015:2111", "initial_release_date": "2015-11-19T03:18:28+00:00", "revision_history": [ { "date": "2015-11-19T03:18:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-11-19T03:18:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T15:28:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.aarch64", "product": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64", "product_id": "grep-debuginfo-0:2.20-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "grep-0:2.20-2.el7.aarch64", "product": { "name": "grep-0:2.20-2.el7.aarch64", "product_id": "grep-0:2.20-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-2.el7.ppc64", "product": { "name": "grep-0:2.20-2.el7.ppc64", "product_id": "grep-0:2.20-2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.ppc64", "product": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64", "product_id": "grep-debuginfo-0:2.20-2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.ppc64le", "product": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le", "product_id": "grep-debuginfo-0:2.20-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "grep-0:2.20-2.el7.ppc64le", "product": { "name": "grep-0:2.20-2.el7.ppc64le", "product_id": "grep-0:2.20-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-2.el7.s390x", "product": { "name": "grep-0:2.20-2.el7.s390x", "product_id": "grep-0:2.20-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.s390x", "product": { "name": "grep-debuginfo-0:2.20-2.el7.s390x", "product_id": "grep-debuginfo-0:2.20-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grep-debuginfo-0:2.20-2.el7.x86_64", "product": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64", "product_id": "grep-debuginfo-0:2.20-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep-debuginfo@2.20-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "grep-0:2.20-2.el7.x86_64", "product": { "name": "grep-0:2.20-2.el7.x86_64", "product_id": "grep-0:2.20-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "grep-0:2.20-2.el7.src", "product": { "name": "grep-0:2.20-2.el7.src", "product_id": "grep-0:2.20-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grep@2.20-2.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.aarch64" }, "product_reference": "grep-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.ppc64" }, "product_reference": "grep-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.s390x" }, "product_reference": "grep-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.src" }, "product_reference": "grep-0:2.20-2.el7.src", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-0:2.20-2.el7.x86_64" }, "product_reference": "grep-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "grep-debuginfo-0:2.20-2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" }, "product_reference": "grep-debuginfo-0:2.20-2.el7.x86_64", "relates_to_product_reference": "7Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1345", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1183651" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "grep: heap buffer overrun", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect versions of grep as shipped in Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client:grep-0:2.20-2.el7.aarch64", "7Client:grep-0:2.20-2.el7.ppc64", "7Client:grep-0:2.20-2.el7.ppc64le", "7Client:grep-0:2.20-2.el7.s390x", "7Client:grep-0:2.20-2.el7.src", "7Client:grep-0:2.20-2.el7.x86_64", "7Client:grep-debuginfo-0:2.20-2.el7.aarch64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Client:grep-debuginfo-0:2.20-2.el7.s390x", "7Client:grep-debuginfo-0:2.20-2.el7.x86_64", "7ComputeNode:grep-0:2.20-2.el7.aarch64", "7ComputeNode:grep-0:2.20-2.el7.ppc64", "7ComputeNode:grep-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-0:2.20-2.el7.s390x", "7ComputeNode:grep-0:2.20-2.el7.src", "7ComputeNode:grep-0:2.20-2.el7.x86_64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64", "7Server:grep-0:2.20-2.el7.aarch64", "7Server:grep-0:2.20-2.el7.ppc64", "7Server:grep-0:2.20-2.el7.ppc64le", "7Server:grep-0:2.20-2.el7.s390x", "7Server:grep-0:2.20-2.el7.src", "7Server:grep-0:2.20-2.el7.x86_64", "7Server:grep-debuginfo-0:2.20-2.el7.aarch64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Server:grep-debuginfo-0:2.20-2.el7.s390x", "7Server:grep-debuginfo-0:2.20-2.el7.x86_64", "7Workstation:grep-0:2.20-2.el7.aarch64", "7Workstation:grep-0:2.20-2.el7.ppc64", "7Workstation:grep-0:2.20-2.el7.ppc64le", "7Workstation:grep-0:2.20-2.el7.s390x", "7Workstation:grep-0:2.20-2.el7.src", "7Workstation:grep-0:2.20-2.el7.x86_64", "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x", "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1345" }, { "category": "external", "summary": "RHBZ#1183651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1345", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1345" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1345" } ], "release_date": "2015-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-19T03:18:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client:grep-0:2.20-2.el7.aarch64", "7Client:grep-0:2.20-2.el7.ppc64", "7Client:grep-0:2.20-2.el7.ppc64le", "7Client:grep-0:2.20-2.el7.s390x", "7Client:grep-0:2.20-2.el7.src", "7Client:grep-0:2.20-2.el7.x86_64", "7Client:grep-debuginfo-0:2.20-2.el7.aarch64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Client:grep-debuginfo-0:2.20-2.el7.s390x", "7Client:grep-debuginfo-0:2.20-2.el7.x86_64", "7ComputeNode:grep-0:2.20-2.el7.aarch64", "7ComputeNode:grep-0:2.20-2.el7.ppc64", "7ComputeNode:grep-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-0:2.20-2.el7.s390x", "7ComputeNode:grep-0:2.20-2.el7.src", "7ComputeNode:grep-0:2.20-2.el7.x86_64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64", "7Server:grep-0:2.20-2.el7.aarch64", "7Server:grep-0:2.20-2.el7.ppc64", "7Server:grep-0:2.20-2.el7.ppc64le", "7Server:grep-0:2.20-2.el7.s390x", "7Server:grep-0:2.20-2.el7.src", "7Server:grep-0:2.20-2.el7.x86_64", "7Server:grep-debuginfo-0:2.20-2.el7.aarch64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Server:grep-debuginfo-0:2.20-2.el7.s390x", "7Server:grep-debuginfo-0:2.20-2.el7.x86_64", "7Workstation:grep-0:2.20-2.el7.aarch64", "7Workstation:grep-0:2.20-2.el7.ppc64", "7Workstation:grep-0:2.20-2.el7.ppc64le", "7Workstation:grep-0:2.20-2.el7.s390x", "7Workstation:grep-0:2.20-2.el7.src", "7Workstation:grep-0:2.20-2.el7.x86_64", "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x", "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2111" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client:grep-0:2.20-2.el7.aarch64", "7Client:grep-0:2.20-2.el7.ppc64", "7Client:grep-0:2.20-2.el7.ppc64le", "7Client:grep-0:2.20-2.el7.s390x", "7Client:grep-0:2.20-2.el7.src", "7Client:grep-0:2.20-2.el7.x86_64", "7Client:grep-debuginfo-0:2.20-2.el7.aarch64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64", "7Client:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Client:grep-debuginfo-0:2.20-2.el7.s390x", "7Client:grep-debuginfo-0:2.20-2.el7.x86_64", "7ComputeNode:grep-0:2.20-2.el7.aarch64", "7ComputeNode:grep-0:2.20-2.el7.ppc64", "7ComputeNode:grep-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-0:2.20-2.el7.s390x", "7ComputeNode:grep-0:2.20-2.el7.src", "7ComputeNode:grep-0:2.20-2.el7.x86_64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.aarch64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.ppc64le", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.s390x", "7ComputeNode:grep-debuginfo-0:2.20-2.el7.x86_64", "7Server:grep-0:2.20-2.el7.aarch64", "7Server:grep-0:2.20-2.el7.ppc64", "7Server:grep-0:2.20-2.el7.ppc64le", "7Server:grep-0:2.20-2.el7.s390x", "7Server:grep-0:2.20-2.el7.src", "7Server:grep-0:2.20-2.el7.x86_64", "7Server:grep-debuginfo-0:2.20-2.el7.aarch64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64", "7Server:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Server:grep-debuginfo-0:2.20-2.el7.s390x", "7Server:grep-debuginfo-0:2.20-2.el7.x86_64", "7Workstation:grep-0:2.20-2.el7.aarch64", "7Workstation:grep-0:2.20-2.el7.ppc64", "7Workstation:grep-0:2.20-2.el7.ppc64le", "7Workstation:grep-0:2.20-2.el7.s390x", "7Workstation:grep-0:2.20-2.el7.src", "7Workstation:grep-0:2.20-2.el7.x86_64", "7Workstation:grep-debuginfo-0:2.20-2.el7.aarch64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64", "7Workstation:grep-debuginfo-0:2.20-2.el7.ppc64le", "7Workstation:grep-debuginfo-0:2.20-2.el7.s390x", "7Workstation:grep-debuginfo-0:2.20-2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "grep: heap buffer overrun" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…