First published: Mon Dec 24 2012(Updated: )
An integer overflow leading to a heap-based buffer overflow was found in the way grep, A utility used to search through textual input for lines which contain a match to a specified pattern, parsed large lines of data. This flaw could use used to crash grep or potentially execute arbitrary code, if a local user was tricked into running grep on a specially crafted data file. Patch: <a href="http://git.savannah.gnu.org/cgit/grep.git/commit/?id=cbbc1a45b9f843c811905c97c90a5d31f8e6c189">http://git.savannah.gnu.org/cgit/grep.git/commit/?id=cbbc1a45b9f843c811905c97c90a5d31f8e6c189</a> Reference: <a href="http://seclists.org/oss-sec/2012/q4/504">http://seclists.org/oss-sec/2012/q4/504</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grep | <2.11 | 2.11 |
GNU Grep | <=2.10 | |
GNU Grep | =2.2 | |
GNU Grep | =2.3 | |
GNU Grep | =2.4 | |
GNU Grep | =2.4.1 | |
GNU Grep | =2.4.2 | |
GNU Grep | =2.5 | |
GNU Grep | =2.5.1 | |
GNU Grep | =2.5.1-a | |
GNU Grep | =2.5.3 | |
GNU Grep | =2.5.4 | |
GNU Grep | =2.6 | |
GNU Grep | =2.6.1 | |
GNU Grep | =2.6.2 | |
GNU Grep | =2.6.3 | |
GNU Grep | =2.7 | |
GNU Grep | =2.8 | |
GNU Grep | =2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.