grep security and bug fix update including heap-based buffer overflow flaw, inconsistent \w and \W symbols matching, and non-UTF-8 text matching bug fi
Reporter | Title | Published | Views | Family All 46 |
---|---|---|---|---|
![]() | Scientific Linux Security Update : grep on SL7.x x86_64 (20151119) | 22 Dec 201500:00 | – | nessus |
![]() | Amazon Linux AMI : grep (ALAS-2016-639) | 19 Jan 201600:00 | – | nessus |
![]() | openSUSE Security Update : grep (openSUSE-2015-121) | 10 Feb 201500:00 | – | nessus |
![]() | Oracle Linux 7 : grep (ELSA-2015-2111) | 24 Nov 201500:00 | – | nessus |
![]() | CentOS 7 : grep (CESA-2015:2111) | 2 Dec 201500:00 | – | nessus |
![]() | GLSA-201502-14 : grep: Denial of Service | 26 Feb 201500:00 | – | nessus |
![]() | RHEL 7 : grep (RHSA-2015:2111) | 19 Nov 201500:00 | – | nessus |
![]() | F5 Networks BIG-IP : Grep vulnerability (K42891424) | 29 Jun 201700:00 | – | nessus |
![]() | RHEL 6 : grep (RHSA-2015:1447) | 23 Jul 201500:00 | – | nessus |
![]() | Amazon Linux AMI : grep (ALAS-2015-598) | 23 Sep 201500:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | ppc64 | grep | 2.20-2.el7 | grep-2.20-2.el7.ppc64.rpm |
RedHat | 7 | s390x | grep | 2.20-2.el7 | grep-2.20-2.el7.s390x.rpm |
RedHat | 7 | src | grep | 2.20-2.el7 | grep-2.20-2.el7.src.rpm |
RedHat | 7 | ppc64le | grep-debuginfo | 2.20-2.el7 | grep-debuginfo-2.20-2.el7.ppc64le.rpm |
RedHat | 7 | aarch64 | grep-debuginfo | 2.20-2.el7 | grep-debuginfo-2.20-2.el7.aarch64.rpm |
RedHat | 7 | ppc64 | grep-debuginfo | 2.20-2.el7 | grep-debuginfo-2.20-2.el7.ppc64.rpm |
RedHat | 7 | aarch64 | grep | 2.20-2.el7 | grep-2.20-2.el7.aarch64.rpm |
RedHat | 7 | x86_64 | grep | 2.20-2.el7 | grep-2.20-2.el7.x86_64.rpm |
RedHat | 7 | s390x | grep-debuginfo | 2.20-2.el7 | grep-debuginfo-2.20-2.el7.s390x.rpm |
RedHat | 7 | x86_64 | grep-debuginfo | 2.20-2.el7 | grep-debuginfo-2.20-2.el7.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo