First published: Wed Sep 14 2022(Updated: )
A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bash | <5.1.8 | 5.1.8 |
debian/bash | 5.0-4 5.2.15-2 5.2.21-2 | |
ubuntu/bash | <5.1-6ubuntu1.1 | 5.1-6ubuntu1.1 |
ubuntu/bash | <5.2 | 5.2 |
IBM Cognos Analytics | <=12.0.0-12.0.2 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 | |
GNU Bash | >=5.1<5.1.8 | |
Red Hat Enterprise Linux | =9.0 |
http://git.savannah.gnu.org/cgit/bash.git/commit/subst.c?id=74091dd4e8086db518b30df7f222691524469998
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3715 is a vulnerability found in the bash package where a heap-buffer overflow can occur in valid parameter_transform.
The severity of CVE-2022-3715 is high with a CVSS score of 7.8.
The bash package with version up to and including 5.1.8, GNU Bash, and Redhat Enterprise Linux version 9.0 are affected by CVE-2022-3715.
CVE-2022-3715 can lead to memory problems due to the heap-buffer overflow that can occur in valid parameter_transform.
To fix CVE-2022-3715, update the bash package to version 5.1.8 or apply the relevant patch provided by the vendor.