Source: slang2 X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security
Hi, The following vulnerabilities were published for slang2. From my perspective they have no real security impact, but we can still treat/fix them as regular bugs: CVE-2023-45927[0]: | S-Lang 2.3.2 was discovered to contain an arithmetic exception via | the function tt_sprintf(). http://lists.jedsoft.org/lists/slang-users/2023/0000003.html CVE-2023-45929[1]: | S-Lang 2.3.2 was discovered to contain a segmentation fault via the | function fixup_tgetstr(). http://lists.jedsoft.org/lists/slang-users/2023/0000002.html If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-45927 https://www.cve.org/CVERecord?id=CVE-2023-45927 [1] https://security-tracker.debian.org/tracker/CVE-2023-45929 https://www.cve.org/CVERecord?id=CVE-2023-45929 Please adjust the affected versions in the BTS as needed.