-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The analysis is based on the ASAN stack trace and patch diff provided in the linked Bugzilla report (https://bugzilla.redhat.com/show_bug.cgi?id=2126720, comment #7) and the GNU bug-bash mailing list (https://lists.gnu.org/archive/html/bug-bash/2022-08/msg00147.html). These sources clearly identify the function valid_parameter_transform in subst.c as the location of the out-of-bounds read. The ASAN report specifies the exact line and nature of the read, and the patch shows the precise code change that mitigates the vulnerability by adding a check for xform[0] before accessing xform[1].