Bug 1183651 (CVE-2015-1345)
Summary: | CVE-2015-1345 grep: heap buffer overrun | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | jkejda, jrusnack, jskarvad, kseifried, lkundrak, yselkowi |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2015-11-20 05:58:41 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1183653, 1194315, 1194322 | ||
Bug Blocks: | 1183652, 1185168, 1193283, 1210268 |
Description
Vasyl Kaigorodov
2015-01-19 11:56:15 UTC
Created grep tracking bugs for this issue: Affects: fedora-all [bug 1183653] This has been assigned CVE-2015-1345[1]. [1] http://seclists.org/oss-sec/2015/q1/221 *** Bug 1185440 has been marked as a duplicate of this bug. *** grep-2.21-2.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report. Statement: This issue did not affect versions of grep as shipped in Red Hat Enterprise Linux 5. This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2015:1447 https://rhn.redhat.com/errata/RHSA-2015-1447.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2111 https://rhn.redhat.com/errata/RHSA-2015-2111.html |