regex.c in GNU ed before 1.14.1 allows attackers to cause a denial of service (crash) via a malformed command, which triggers an invalid free.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2017/01/12/5 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/12/6 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/12/7 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/13/3 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/95422 | Third Party Advisory VDB Entry |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVH54XNZ77ICNBJTPI2DLJYQTA3SYSFC/ | |
https://lists.gnu.org/archive/html/bug-ed/2017-01/msg00000.html | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2017-02-17 02:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-5357
Mitre link : CVE-2017-5357
CVE.ORG link : CVE-2017-5357
JSON object : View
Products Affected
gnu
- ed
fedoraproject
- fedora
CWE
CWE-416
Use After Free