[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[FD] SEGV in S-Lang via fixup_tgetstr()
- To: "fulldisclosure@xxxxxxxxxxxx" <fulldisclosure@xxxxxxxxxxxx>
- Subject: [FD] SEGV in S-Lang via fixup_tgetstr()
- From: Meng Ruijie <ruijie_meng@xxxxxxxxx>
- Date: Sat, 20 Jan 2024 04:01:49 +0000
[Vulnerability description]
S-Lang v2.3.2 was discovered to contain a SEGV via the function fixup_tgetstr().
[VulnerabilityType Other]
SEGV
[Vendor of Product]
S-Lang
[Affected Product Code Base]
S-Lang - 2.3.2
[Reference]
http://lists.jedsoft.org/lists/slang-users/2023/0000002.html
[CVE Reference]
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2023-45929 to this vulnerability.
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/