CVE-2022-3715: A flaw was found in the bash package, where a heap-buffer overflow can occur in valid...
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.14441%
CWE
Published
1/5/2023
Updated
1/29/2023
KEV Status
No
Technology
-
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis is based on the ASAN stack trace and patch diff provided in the linked Bugzilla report (https://bugzilla.redhat.com/show_bug.cgi?id=2126720, comment #7) and the GNU bug-bash mailing list (https://lists.gnu.org/archive/html/bug-bash/2022-08/msg00147.html). These sources clearly identify the function valid_parameter_transform in subst.c as the location of the out-of-bounds read. The ASAN report specifies the exact line and nature of the read, and the patch shows the precise code change that mitigates the vulnerability by adding a check for xform[0] before accessing xform[1].