[ALSA-2023:5249] Moderate: ncurses security update
Type:
security
Severity:
moderate
Release date:
2023-09-21
Description:
The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo. Security Fix(es): * ncurses: Local users can trigger security-relevant memory corruption via malformed data (CVE-2023-29491) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 ncurses-6.1-9.20180224.el8_8.1.aarch64.rpm 112b3e52beb97a39bda32a16767709bd8756c6a101d072ed7685c8386596faa6
aarch64 ncurses-compat-libs-6.1-9.20180224.el8_8.1.aarch64.rpm 2504951533678f61b11a21f23c87c3090ffc721b4d811603aa7e196715d5c4b3
aarch64 ncurses-c++-libs-6.1-9.20180224.el8_8.1.aarch64.rpm 42fef320770d22e82923f136a8daaa72f8e85cb107d1aeee8a271c169e359311
aarch64 ncurses-devel-6.1-9.20180224.el8_8.1.aarch64.rpm 65df3ee57cdbc0deae401687394d4bedc2dfb71a896904eb07ad47f811a5c2b0
aarch64 ncurses-libs-6.1-9.20180224.el8_8.1.aarch64.rpm c29c0fb84c354ca5ba045995c834e5b5e4413caab179801849c78e30ff5912bd
i686 ncurses-libs-6.1-9.20180224.el8_8.1.i686.rpm 17f01ecf5d920ce1ed384640607be0453d480b03b44b2ee3db85e52380bceaa6
i686 ncurses-c++-libs-6.1-9.20180224.el8_8.1.i686.rpm 3dd1cf4d819a1c2de7be9c2413ea275a4146aa5eecdfd60b7e0cf4b2866fd99c
i686 ncurses-devel-6.1-9.20180224.el8_8.1.i686.rpm 740b4b8f3403ab43b31b0b9cbe99b4da6eb00fcadfec7da9eb6556625de17ea5
i686 ncurses-compat-libs-6.1-9.20180224.el8_8.1.i686.rpm dc42efd38e9e79e1674fc907d46b42222c85ee9f1573075d8962d1a5a2bb28d6
noarch ncurses-base-6.1-9.20180224.el8_8.1.noarch.rpm dd8c3098a4afa2cd28b690640da2dd819102cb7b9f4fad81586ffae512e9014c
noarch ncurses-term-6.1-9.20180224.el8_8.1.noarch.rpm efe042c739d7584ee0bf53a03813f38713862829be02f394121fe0fa9bbea4b6
ppc64le ncurses-libs-6.1-9.20180224.el8_8.1.ppc64le.rpm 0007b0d678089f9ede3e3053889fd61d92a833a1b1efb1961f844c5c4e2e8ee7
ppc64le ncurses-c++-libs-6.1-9.20180224.el8_8.1.ppc64le.rpm a5ca74bc452e499fb64d91c974fd264b2674d8dc1f4b0fbf06508cc15fe9c428
ppc64le ncurses-6.1-9.20180224.el8_8.1.ppc64le.rpm c84b253485f1d0d2cea328320a65b2d7507bc4f0cf182b885a38a7d04b2b0025
ppc64le ncurses-compat-libs-6.1-9.20180224.el8_8.1.ppc64le.rpm cf6be5ef72a2b0ad4f064f124037a61478e43b03ce2fe022bce77df45502ca27
ppc64le ncurses-devel-6.1-9.20180224.el8_8.1.ppc64le.rpm e609044d20120eddd88a046fba6168e4dda966e88dccefa1b303e77ccd898d72
s390x ncurses-devel-6.1-9.20180224.el8_8.1.s390x.rpm 16410a33689a14afd6f5bb89def30f4abcb9b24d7e40f529548f40b080ab422a
s390x ncurses-c++-libs-6.1-9.20180224.el8_8.1.s390x.rpm 506b959880a4ae6e5d9b247b2622ab0c3760673cef48d9760dc845027388ce84
s390x ncurses-6.1-9.20180224.el8_8.1.s390x.rpm 569384db5186c1291e95f10c01c2b29f654ea0205d09b3d63a12cb0af7a77661
s390x ncurses-compat-libs-6.1-9.20180224.el8_8.1.s390x.rpm e86b972dbbf1084c81669000ba95fe2537307317f37de3e19341c6592fa0a169
s390x ncurses-libs-6.1-9.20180224.el8_8.1.s390x.rpm f2d2b4404a09a98782dbeb8aed886ceadcc826b93c19aa1c4d99466597b7c903
x86_64 ncurses-6.1-9.20180224.el8_8.1.x86_64.rpm 4ecf0549ac4990a7b1ef2d98531564215be3b853e279704e2997b9935642d65e
x86_64 ncurses-libs-6.1-9.20180224.el8_8.1.x86_64.rpm 745c2ff9224ba553cedc99cbf56c4a7f207e189ccfee3fce3f477dcec1c62bda
x86_64 ncurses-devel-6.1-9.20180224.el8_8.1.x86_64.rpm 924b65f538d3538f0dffee5ec2ea26c369655187add69fcdc163f4db529c371e
x86_64 ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64.rpm a8637c7aea2014e43fda37768be8dea47f8495b51dadff943032b61eb19a8ae9
x86_64 ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64.rpm ca84450055cbe7a76ce96f9261ea98f0429d4573df2c3200a3365eeb960b30cb
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.