[ALSA-2021:4426] Moderate: ncurses security update
Type:
security
Severity:
moderate
Release date:
2021-11-09
Description:
The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo. Security Fix(es): * ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c (CVE-2019-17594) * ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c (CVE-2019-17595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages:
  • ncurses-6.1-9.20180224.el8.x86_64.rpm
  • ncurses-base-6.1-9.20180224.el8.noarch.rpm
  • ncurses-compat-libs-6.1-9.20180224.el8.x86_64.rpm
  • ncurses-compat-libs-6.1-9.20180224.el8.x86_64.rpm
  • ncurses-devel-6.1-9.20180224.el8.x86_64.rpm
  • ncurses-devel-6.1-9.20180224.el8.x86_64.rpm
  • ncurses-c++-libs-6.1-9.20180224.el8.x86_64.rpm
  • ncurses-c++-libs-6.1-9.20180224.el8.x86_64.rpm
  • ncurses-term-6.1-9.20180224.el8.noarch.rpm
  • ncurses-libs-6.1-9.20180224.el8.x86_64.rpm
  • ncurses-libs-6.1-9.20180224.el8.x86_64.rpm
  • ncurses-libs-6.1-9.20180224.el8.aarch64.rpm
  • ncurses-c++-libs-6.1-9.20180224.el8.aarch64.rpm
  • ncurses-devel-6.1-9.20180224.el8.aarch64.rpm
  • ncurses-compat-libs-6.1-9.20180224.el8.aarch64.rpm
  • ncurses-6.1-9.20180224.el8.aarch64.rpm
  • ncurses-6.1-9.20180224.el8.ppc64le.rpm
  • ncurses-compat-libs-6.1-9.20180224.el8.ppc64le.rpm
  • ncurses-devel-6.1-9.20180224.el8.ppc64le.rpm
  • ncurses-c++-libs-6.1-9.20180224.el8.ppc64le.rpm
  • ncurses-libs-6.1-9.20180224.el8.ppc64le.rpm
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.