Bugzilla – Full Text Bug Listing |
Summary: | VUL-1: CVE-2017-5357: ed:invalid free | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Andreas Stieger <astieger> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Minor | ||
Priority: | P4 - Low | CC: | astieger, atoptsoglou, cmertens, peter.simons, smash_bz, tchvatal |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/178632/ | ||
Whiteboard: | CVSSv2:SUSE:CVE-2017-5357:2.1:(AV:L/AC:L/Au:N/C:N/I:N/A:P) maint:released:sle10-sp3:63371 | ||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Description
Andreas Stieger
2017-01-13 08:17:01 UTC
bugbot adjusting priority It's probably not important, but shouldn't the "free(exp)" be replaced by "regfree(exp)"? (In reply to Peter Simons from comment #5) > It's probably not important, but shouldn't the "free(exp)" be replaced by > "regfree(exp)"? The line is in a code path where regcomp returned >0, e.g. the regex was not compiled or memory allocated that would need to be freed with regfree() > n = regcomp( exp, pat, 0 ); > if( n ) > { > char buf[80]; > regerror( n, exp, buf, sizeof buf ); > set_error_msg( buf ); > exp = 0; > } > return exp; An update workflow for this issue was started. This issue was rated as low. Please submit fixed packages until 2017-03-01. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63370 SUSE-SU-2019:14005-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 1019807 CVE References: CVE-2017-5357 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): ed-0.2-1001.30.3.4 SUSE Linux Enterprise Debuginfo 11-SP4 (src): ed-0.2-1001.30.3.4 *** NOTE: This information is not intended to be used for external communication, because this may only be a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2020:1608-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 1019807 CVE References: CVE-2017-5357 Sources used: SUSE Linux Enterprise Server 12-SP5 (src): ed-1.9-4.4.5 SUSE Linux Enterprise Server 12-SP4 (src): ed-1.9-4.4.5 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. Done |