[USN-6451-1] ncurses vulnerability

Fabian Toepfer fabian.toepfer at canonical.com
Tue Oct 24 19:29:50 UTC 2023


==========================================================================
Ubuntu Security Notice USN-6451-1
October 24, 2023

ncurses vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

ncurses could be made to crash if it opened a specially crafted
file.

Software Description:
- ncurses: shared libraries for terminal handling

Details:

It was discovered that ncurses could be made to read out of bounds.
An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
   lib32ncurses5                   6.1-1ubuntu1.18.04.1+esm1
   lib32ncursesw5                  6.1-1ubuntu1.18.04.1+esm1
   lib32tinfo5                     6.1-1ubuntu1.18.04.1+esm1
   lib64ncurses5                   6.1-1ubuntu1.18.04.1+esm1
   lib64tinfo5                     6.1-1ubuntu1.18.04.1+esm1
   libncurses5                     6.1-1ubuntu1.18.04.1+esm1
   libncursesw5                    6.1-1ubuntu1.18.04.1+esm1
   libtinfo5                       6.1-1ubuntu1.18.04.1+esm1
   libx32ncurses5                  6.1-1ubuntu1.18.04.1+esm1
   libx32ncursesw5                 6.1-1ubuntu1.18.04.1+esm1
   libx32tinfo5                    6.1-1ubuntu1.18.04.1+esm1
   ncurses-bin                     6.1-1ubuntu1.18.04.1+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
   lib32ncurses5                   6.0+20160213-1ubuntu1+esm4
   lib32ncursesw5                  6.0+20160213-1ubuntu1+esm4
   lib32tinfo5                     6.0+20160213-1ubuntu1+esm4
   lib64ncurses5                   6.0+20160213-1ubuntu1+esm4
   lib64tinfo5                     6.0+20160213-1ubuntu1+esm4
   libncurses5                     6.0+20160213-1ubuntu1+esm4
   libncursesw5                    6.0+20160213-1ubuntu1+esm4
   libtinfo5                       6.0+20160213-1ubuntu1+esm4
   libx32ncurses5                  6.0+20160213-1ubuntu1+esm4
   libx32ncursesw5                 6.0+20160213-1ubuntu1+esm4
   libx32tinfo5                    6.0+20160213-1ubuntu1+esm4
   ncurses-bin                     6.0+20160213-1ubuntu1+esm4

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
   lib32ncurses5                   5.9+20140118-1ubuntu1+esm4
   lib32ncursesw5                  5.9+20140118-1ubuntu1+esm4
   lib32tinfo5                     5.9+20140118-1ubuntu1+esm4
   lib64ncurses5                   5.9+20140118-1ubuntu1+esm4
   lib64tinfo5                     5.9+20140118-1ubuntu1+esm4
   libncurses5                     5.9+20140118-1ubuntu1+esm4
   libncursesw5                    5.9+20140118-1ubuntu1+esm4
   libtinfo5                       5.9+20140118-1ubuntu1+esm4
   libx32ncurses5                  5.9+20140118-1ubuntu1+esm4
   libx32ncursesw5                 5.9+20140118-1ubuntu1+esm4
   libx32tinfo5                    5.9+20140118-1ubuntu1+esm4
   ncurses-bin                     5.9+20140118-1ubuntu1+esm4

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-6451-1
   CVE-2020-19189

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20231024/a05d826e/attachment-0001.sig>


More information about the ubuntu-security-announce mailing list