SEGV in S-Lang via fixup_tgetstr()
2024-1-26 23:11:11 Author: seclists.org(查看原文) 阅读量:7 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Meng Ruijie <ruijie_meng () u nus edu>
Date: Sat, 20 Jan 2024 04:01:49 +0000

[Vulnerability description]
S-Lang v2.3.2 was discovered to contain a SEGV via the function fixup_tgetstr().

[VulnerabilityType Other]
SEGV

[Vendor of Product]
S-Lang

[Affected Product Code Base]
S-Lang - 2.3.2

[Reference]
http://lists.jedsoft.org/lists/slang-users/2023/0000002.html

[CVE Reference]
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2023-45929 to this 
vulnerability.
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • SEGV in S-Lang via fixup_tgetstr() Meng Ruijie (Jan 26)

文章来源: https://seclists.org/fulldisclosure/2024/Jan/57
如有侵权请联系:admin#unsafe.sh