Описание
In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | code not present |
| devel | not-affected | |
| esm-infra-legacy/trusty | not-affected | code not present |
| esm-infra/bionic | not-affected | code not present |
| esm-infra/focal | released | 3.0a-2ubuntu0.2 |
| esm-infra/xenial | not-affected | code not present |
| focal | released | 3.0a-2ubuntu0.2 |
| groovy | released | 3.1b-1ubuntu0.1 |
| precise/esm | not-affected | |
| trusty | ignored | end of standard support |
Показывать по
EPSS
4.6 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.
In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.
In tmux before version 3.1c the function input_csi_dispatch_sgr_colon( ...
The function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.
EPSS
4.6 Medium
CVSS2
8.8 High
CVSS3