|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-1: CVE-2023-45918: ncurses: NULL pointer dereference via corrupted xterm-256color file | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Dr. Werner Fink <werner> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Minor | ||
| Priority: | P4 - Low | CC: | carlos.lopez, smash_bz, werner |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/394401/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-45918:3.3:(AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2024-02-19 09:14:14 UTC
This should be fixed with ncurses-6.4-20230615.patch
20230615
+ modify _nc_read_file_entry() to show relevant filename in warnings.
+ improve checks in convert_string() for corrupt terminfo entry (report
and test-case by Gregory James Duck).
Not sure if this is really required for SLE-12 (ncurses 5.9) or SLE-15 (ncurses 6.1) ... if not, why this bug report happend as this is a long time fixed in openSUSE Factory. No answer ... I still not know if the SR for SLE-12 and SLE-15 are really required (In reply to Dr. Werner Fink from comment #4) > No answer ... I still not know if the SR for SLE-12 and SLE-15 are really > required I could not reproduce the bug for SLE-12, but I could for SUSE:SLE-15:Update. We also need a submission for SUSE:ALP:Source:Standard:1.0. (In reply to Carlos López from comment #5) > (In reply to Dr. Werner Fink from comment #4) > > No answer ... I still not know if the SR for SLE-12 and SLE-15 are really > > required > > I could not reproduce the bug for SLE-12, but I could for > SUSE:SLE-15:Update. We also need a submission for > SUSE:ALP:Source:Standard:1.0. Shouldn't SUSE:ALP:Source:Standard:1.0 be updated with latest Update for SUSE:SLE-15 automatically? (In reply to Dr. Werner Fink from comment #6) > (In reply to Carlos López from comment #5) > > (In reply to Dr. Werner Fink from comment #4) > > > No answer ... I still not know if the SR for SLE-12 and SLE-15 are really > > > required > > > > I could not reproduce the bug for SLE-12, but I could for > > SUSE:SLE-15:Update. We also need a submission for > > SUSE:ALP:Source:Standard:1.0. > > Shouldn't SUSE:ALP:Source:Standard:1.0 be updated with latest Update for > SUSE:SLE-15 automatically? Not as far as I know. You can even see they are not synchronized right now by looking at the changes file. (In reply to Dr. Werner Fink from comment #6) > (In reply to Carlos López from comment #5) > > (In reply to Dr. Werner Fink from comment #4) > > > No answer ... I still not know if the SR for SLE-12 and SLE-15 are really > > > required > > > > I could not reproduce the bug for SLE-12, but I could for > > SUSE:SLE-15:Update. We also need a submission for > > SUSE:ALP:Source:Standard:1.0. > > Shouldn't SUSE:ALP:Source:Standard:1.0 be updated with latest Update for > SUSE:SLE-15 automatically? Ah ... I see this is an old Factory submission ... OK let's update SR#322721 internal SR#322721 is accepted SUSE-SU-2024:1133-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1220061 CVE References: CVE-2023-45918 Maintenance Incident: [SUSE:Maintenance:32649](https://smelt.suse.de/incident/32649/) Sources used: openSUSE Leap Micro 5.3 (src): ncurses-6.1-150000.5.24.1 openSUSE Leap Micro 5.4 (src): ncurses-6.1-150000.5.24.1 openSUSE Leap 15.5 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro 5.3 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro 5.4 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro 5.5 (src): ncurses-6.1-150000.5.24.1 Basesystem Module 15-SP5 (src): ncurses-6.1-150000.5.24.1 Development Tools Module 15-SP5 (src): ncurses-6.1-150000.5.24.1 Legacy Module 15-SP5 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro 5.1 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro 5.2 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): ncurses-6.1-150000.5.24.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2024:1132-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1220061 CVE References: CVE-2023-45918 Maintenance Incident: [SUSE:Maintenance:32650](https://smelt.suse.de/incident/32650/) Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): ncurses-5.9-88.1 SUSE Linux Enterprise Server 12 SP5 (src): ncurses-5.9-88.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): ncurses-5.9-88.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): ncurses-5.9-88.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. |