An issue in ncurses crate through 5.99.0 for Rust, leading to instr and mvwinstr buffer overflows due to mishandled C function interaction
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
Cvelist | CVE-2019-15548 | 26 Aug 201917:02 | โ | cvelist |
UbuntuCve | CVE-2019-15548 | 26 Aug 201900:00 | โ | ubuntucve |
CVE | CVE-2019-15548 | 26 Aug 201918:15 | โ | cve |
Prion | Buffer overflow | 26 Aug 201918:15 | โ | prion |
NVD | CVE-2019-15548 | 26 Aug 201918:15 | โ | nvd |
Github Security Blog | Buffer overflow and format vulnerabilities in ncurses | 25 Aug 202120:58 | โ | github |
OSV | Mishandling of format strings in ncurses | 25 Aug 202120:58 | โ | osv |
OSV | Buffer overflow and format vulnerabilities in functions exposed without unsafe | 15 Jun 201912:00 | โ | osv |
OSV | Buffer overflow and format vulnerabilities in ncurses | 25 Aug 202120:58 | โ | osv |
RustSec | Buffer overflow and format vulnerabilities in functions exposed without unsafe | 15 Jun 201912:00 | โ | rustsec |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 999 | all | rust-ncurses | 5.99.0-3 | rust-ncurses_5.99.0-3_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo