regex.c in GNU ed before 1.14.1 allows attackers to cause a denial of service (crash) via a malformed command, which triggers an invalid free.
References
Link | Resource |
---|---|
https://lists.gnu.org/archive/html/bug-ed/2017-01/msg00000.html | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVH54XNZ77ICNBJTPI2DLJYQTA3SYSFC/ | Third Party Advisory |
http://www.securityfocus.com/bid/95422 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2017/01/13/3 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/12/7 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/12/6 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/12/5 | Mailing List Patch Third Party Advisory |
Information
Published : 2017-02-16 18:59
Updated : 2017-02-17 09:48
NVD link : CVE-2017-5357
Mitre link : CVE-2017-5357
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
gnu
- ed
fedoraproject
- fedora