Tuesday, October 24, 2023

[USN-6451-1] ncurses vulnerability

-----BEGIN PGP SIGNATURE-----
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=JV0p
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6451-1
October 24, 2023

ncurses vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

ncurses could be made to crash if it opened a specially crafted
file.

Software Description:
- ncurses: shared libraries for terminal handling

Details:

It was discovered that ncurses could be made to read out of bounds.
An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  lib32ncurses5                   6.1-1ubuntu1.18.04.1+esm1
  lib32ncursesw5                  6.1-1ubuntu1.18.04.1+esm1
  lib32tinfo5                     6.1-1ubuntu1.18.04.1+esm1
  lib64ncurses5                   6.1-1ubuntu1.18.04.1+esm1
  lib64tinfo5                     6.1-1ubuntu1.18.04.1+esm1
  libncurses5                     6.1-1ubuntu1.18.04.1+esm1
  libncursesw5                    6.1-1ubuntu1.18.04.1+esm1
  libtinfo5                       6.1-1ubuntu1.18.04.1+esm1
  libx32ncurses5                  6.1-1ubuntu1.18.04.1+esm1
  libx32ncursesw5                 6.1-1ubuntu1.18.04.1+esm1
  libx32tinfo5                    6.1-1ubuntu1.18.04.1+esm1
  ncurses-bin                     6.1-1ubuntu1.18.04.1+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  lib32ncurses5                   6.0+20160213-1ubuntu1+esm4
  lib32ncursesw5                  6.0+20160213-1ubuntu1+esm4
  lib32tinfo5                     6.0+20160213-1ubuntu1+esm4
  lib64ncurses5                   6.0+20160213-1ubuntu1+esm4
  lib64tinfo5                     6.0+20160213-1ubuntu1+esm4
  libncurses5                     6.0+20160213-1ubuntu1+esm4
  libncursesw5                    6.0+20160213-1ubuntu1+esm4
  libtinfo5                       6.0+20160213-1ubuntu1+esm4
  libx32ncurses5                  6.0+20160213-1ubuntu1+esm4
  libx32ncursesw5                 6.0+20160213-1ubuntu1+esm4
  libx32tinfo5                    6.0+20160213-1ubuntu1+esm4
  ncurses-bin                     6.0+20160213-1ubuntu1+esm4

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  lib32ncurses5                   5.9+20140118-1ubuntu1+esm4
  lib32ncursesw5                  5.9+20140118-1ubuntu1+esm4
  lib32tinfo5                     5.9+20140118-1ubuntu1+esm4
  lib64ncurses5                   5.9+20140118-1ubuntu1+esm4
  lib64tinfo5                     5.9+20140118-1ubuntu1+esm4
  libncurses5                     5.9+20140118-1ubuntu1+esm4
  libncursesw5                    5.9+20140118-1ubuntu1+esm4
  libtinfo5                       5.9+20140118-1ubuntu1+esm4
  libx32ncurses5                  5.9+20140118-1ubuntu1+esm4
  libx32ncursesw5                 5.9+20140118-1ubuntu1+esm4
  libx32tinfo5                    5.9+20140118-1ubuntu1+esm4
  ncurses-bin                     5.9+20140118-1ubuntu1+esm4

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6451-1
  CVE-2020-19189

No comments:

Post a Comment