CVE-2012-5667
Published: January 3, 2013Last modified: November 10, 2023
Description
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | grep | Not affected (3.8-r1) |
Stream | grep | Not affected (3.11-r0) |
References
- http://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91
- http://git.savannah.gnu.org/cgit/grep.git/commit/?id=cbbc1a45b9f843c811905c97c90a5d31f8e6c189
- http://git.sv.gnu.org/gitweb/?p=grep.git%3Ba=shortlog%3Bh=v2.11
- http://lists.gnu.org/archive/html/bug-grep/2012-12/msg00004.html
- http://openwall.com/lists/oss-security/2012/12/22/6
- http://rhn.redhat.com/errata/RHSA-2015-1447.html
- http://www.securityfocus.com/bid/57033
- https://bugs.launchpad.net/ubuntu/+source/grep/+bug/1091473
- https://bugzilla.redhat.com/show_bug.cgi?id=889935