-----BEGIN PGP SIGNATURE-----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=JV0p
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6451-1
October 24, 2023
ncurses vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)
Summary:
ncurses could be made to crash if it opened a specially crafted
file.
Software Description:
- ncurses: shared libraries for terminal handling
Details:
It was discovered that ncurses could be made to read out of bounds.
An attacker could possibly use this issue to cause a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
lib32ncurses5 6.1-1ubuntu1.18.04.1+esm1
lib32ncursesw5 6.1-1ubuntu1.18.04.1+esm1
lib32tinfo5 6.1-1ubuntu1.18.04.1+esm1
lib64ncurses5 6.1-1ubuntu1.18.04.1+esm1
lib64tinfo5 6.1-1ubuntu1.18.04.1+esm1
libncurses5 6.1-1ubuntu1.18.04.1+esm1
libncursesw5 6.1-1ubuntu1.18.04.1+esm1
libtinfo5 6.1-1ubuntu1.18.04.1+esm1
libx32ncurses5 6.1-1ubuntu1.18.04.1+esm1
libx32ncursesw5 6.1-1ubuntu1.18.04.1+esm1
libx32tinfo5 6.1-1ubuntu1.18.04.1+esm1
ncurses-bin 6.1-1ubuntu1.18.04.1+esm1
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
lib32ncurses5 6.0+20160213-1ubuntu1+esm4
lib32ncursesw5 6.0+20160213-1ubuntu1+esm4
lib32tinfo5 6.0+20160213-1ubuntu1+esm4
lib64ncurses5 6.0+20160213-1ubuntu1+esm4
lib64tinfo5 6.0+20160213-1ubuntu1+esm4
libncurses5 6.0+20160213-1ubuntu1+esm4
libncursesw5 6.0+20160213-1ubuntu1+esm4
libtinfo5 6.0+20160213-1ubuntu1+esm4
libx32ncurses5 6.0+20160213-1ubuntu1+esm4
libx32ncursesw5 6.0+20160213-1ubuntu1+esm4
libx32tinfo5 6.0+20160213-1ubuntu1+esm4
ncurses-bin 6.0+20160213-1ubuntu1+esm4
Ubuntu 14.04 LTS (Available with Ubuntu Pro):
lib32ncurses5 5.9+20140118-1ubuntu1+esm4
lib32ncursesw5 5.9+20140118-1ubuntu1+esm4
lib32tinfo5 5.9+20140118-1ubuntu1+esm4
lib64ncurses5 5.9+20140118-1ubuntu1+esm4
lib64tinfo5 5.9+20140118-1ubuntu1+esm4
libncurses5 5.9+20140118-1ubuntu1+esm4
libncursesw5 5.9+20140118-1ubuntu1+esm4
libtinfo5 5.9+20140118-1ubuntu1+esm4
libx32ncurses5 5.9+20140118-1ubuntu1+esm4
libx32ncursesw5 5.9+20140118-1ubuntu1+esm4
libx32tinfo5 5.9+20140118-1ubuntu1+esm4
ncurses-bin 5.9+20140118-1ubuntu1+esm4
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6451-1
CVE-2020-19189
No comments:
Post a Comment