MGASA-2018-0002

Source
https://advisories.mageia.org/MGASA-2018-0002.html
Import Source
https://advisories.mageia.org/MGASA-2018-0002.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0002
Related
Published
2018-01-01T01:17:34Z
Modified
2018-01-01T00:51:39Z
Summary
Updated ncurses packages fix security vulnerabilities
Details

Possible RCE via stack-based buffer overflow in the fmt_entry function (CVE-2017-10684).

Possible RCE with format string vulnerability in the fmt_entry function (CVE-2017-10685).

Illegal address access in append_acs (CVE-2017-11112).

Dereferencing NULL pointer in ncparse_entry (CVE-2017-11113).

Fix infinite loop in the nextchar function in compscan.c (CVE-2017-13728).

Fix illegal address access in the ncsave_str (CVE-2017-13729).

Fix illegal address access in the function ncreadentrysource() (CVE-2017-13730).

Fix illegal address access in the function postprocess_termcap() (CVE-2017-13731).

Fix illegal address access in the function dump_uses() (CVE-2017-13732).

Fix illegal address access in the fmt_entry function (CVE-2017-13733).

Fix stack-based buffer overflow in the ncwrite_entry() function (CVE-2017-16879).

References
Credits

Affected packages

Mageia:6 / ncurses

Package

Name
ncurses
Purl
pkg:rpm/mageia/ncurses?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0-8.1.mga6

Ecosystem specific

{
    "section": "core"
}