regex.c in GNU ed before 1.14.1 allows attackers to cause a denial of service (crash) via a malformed command, which triggers an invalid free.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.openwall.com/lists/oss-security/2017/01/12/5 | Mailing List Patch Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2017/01/12/6 | Mailing List Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2017/01/12/7 | Mailing List Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2017/01/13/3 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/95422 | Third Party Advisory VDB Entry | 
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVH54XNZ77ICNBJTPI2DLJYQTA3SYSFC/ | |
| https://lists.gnu.org/archive/html/bug-ed/2017-01/msg00000.html | Vendor Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2017-02-17 02:59
Updated : 2023-11-07 02:49
NVD link : CVE-2017-5357
Mitre link : CVE-2017-5357
CVE.ORG link : CVE-2017-5357
JSON object : View
Products Affected
                gnu
- ed
 
fedoraproject
- fedora
 
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
