{"id":"RHSA-2015:1447","summary":"Red Hat Security Advisory: grep security, bug fix, and enhancement update","modified":"2026-03-11T06:57:35.200344Z","published":"2024-09-15T22:19:19Z","upstream":["CVE-2012-5667","CVE-2015-1345"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2015:1447"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#low"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=799863"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=889935"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=982215"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1103270"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1167766"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1171806"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183651"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1447.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-5667"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-5667"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5667"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-1345"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-1345"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-1345"}],"affected":[{"package":{"name":"grep","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/grep"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.20-3.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2015:1447.json"}},{"package":{"name":"grep-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/grep-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.20-3.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2015:1447.json"}},{"package":{"name":"grep","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/grep"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.20-3.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2015:1447.json"}},{"package":{"name":"grep-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/grep-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.20-3.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2015:1447.json"}},{"package":{"name":"grep","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/grep"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.20-3.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2015:1447.json"}},{"package":{"name":"grep-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/grep-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.20-3.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2015:1447.json"}},{"package":{"name":"grep","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/grep"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.20-3.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2015:1447.json"}},{"package":{"name":"grep-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/grep-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.20-3.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2015:1447.json"}}],"schema_version":"1.7.5"}