DEBIAN-CVE-2023-45929

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2023-45929
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-45929.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-45929
Upstream
Published
2024-03-27T04:15:11Z
Modified
2025-09-18T05:19:03Z
Summary
[none]
Details

S-Lang 2.3.2 was discovered to contain a segmentation fault via the function fixup_tgetstr().

References

Affected packages

Debian:11 / slang2

Package

Name
slang2
Purl
pkg:deb/debian/slang2?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / slang2

Package

Name
slang2
Purl
pkg:deb/debian/slang2?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / slang2

Package

Name
slang2
Purl
pkg:deb/debian/slang2?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:14 / slang2

Package

Name
slang2
Purl
pkg:deb/debian/slang2?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}