urwid is vulnerable to Buffer Overflow
20
Low Risk
Affected versions of this package are vulnerable to a potential Buffer Overflow in the get_cols_rows function when retrieving terminal dimensions (columns and rows). Improper handling of the ioctl response may lead to Undefined Behavior or Denial of Service (DoS) if malformed or unexpected data is returned.
You are affected if you are using a version that falls within the vulnerable range.
urwid is vulnerable to Buffer Overflow in versions 2.4.0 - 3.0.2.
Upgrade the urwid library to a patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant