Bug 1220061 (CVE-2023-45918)

Summary: VUL-1: CVE-2023-45918: ncurses: NULL pointer dereference via corrupted xterm-256color file
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Dr. Werner Fink <werner>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Minor    
Priority: P4 - Low CC: carlos.lopez, smash_bz, werner
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/394401/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-45918:3.3:(AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-02-19 09:14:14 UTC
ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45918
https://www.cve.org/CVERecord?id=CVE-2023-45918
https://lists.gnu.org/archive/html/bug-ncurses/2023-06/msg00005.html
Comment 1 Dr. Werner Fink 2024-02-19 09:46:42 UTC
This should be fixed with ncurses-6.4-20230615.patch

 20230615
        + modify _nc_read_file_entry() to show relevant filename in warnings.
        + improve checks in convert_string() for corrupt terminfo entry (report
          and test-case by Gregory James Duck).
Comment 3 Dr. Werner Fink 2024-02-20 08:48:11 UTC
Not sure if this is really required for SLE-12 (ncurses 5.9) or SLE-15 (ncurses 6.1) ... if not, why this bug report happend as this is a long time fixed in openSUSE Factory.
Comment 4 Dr. Werner Fink 2024-02-26 08:06:08 UTC
No answer ... I still not know if the SR for SLE-12 and SLE-15 are really required
Comment 5 Carlos López 2024-02-26 09:57:03 UTC
(In reply to Dr. Werner Fink from comment #4)
> No answer ... I still not know if the SR for SLE-12 and SLE-15 are really
> required

I could not reproduce the bug for SLE-12, but I could for SUSE:SLE-15:Update. We also need a submission for SUSE:ALP:Source:Standard:1.0.
Comment 6 Dr. Werner Fink 2024-02-26 10:14:27 UTC
(In reply to Carlos López from comment #5)
> (In reply to Dr. Werner Fink from comment #4)
> > No answer ... I still not know if the SR for SLE-12 and SLE-15 are really
> > required
> 
> I could not reproduce the bug for SLE-12, but I could for
> SUSE:SLE-15:Update. We also need a submission for
> SUSE:ALP:Source:Standard:1.0.

Shouldn't SUSE:ALP:Source:Standard:1.0 be updated with latest Update for SUSE:SLE-15 automatically?
Comment 7 Carlos López 2024-02-26 10:18:25 UTC
(In reply to Dr. Werner Fink from comment #6)
> (In reply to Carlos López from comment #5)
> > (In reply to Dr. Werner Fink from comment #4)
> > > No answer ... I still not know if the SR for SLE-12 and SLE-15 are really
> > > required
> > 
> > I could not reproduce the bug for SLE-12, but I could for
> > SUSE:SLE-15:Update. We also need a submission for
> > SUSE:ALP:Source:Standard:1.0.
> 
> Shouldn't SUSE:ALP:Source:Standard:1.0 be updated with latest Update for
> SUSE:SLE-15 automatically?

Not as far as I know. You can even see they are not synchronized right now by looking at the changes file.
Comment 8 Dr. Werner Fink 2024-02-26 10:19:01 UTC
(In reply to Dr. Werner Fink from comment #6)
> (In reply to Carlos López from comment #5)
> > (In reply to Dr. Werner Fink from comment #4)
> > > No answer ... I still not know if the SR for SLE-12 and SLE-15 are really
> > > required
> > 
> > I could not reproduce the bug for SLE-12, but I could for
> > SUSE:SLE-15:Update. We also need a submission for
> > SUSE:ALP:Source:Standard:1.0.
> 
> Shouldn't SUSE:ALP:Source:Standard:1.0 be updated with latest Update for
> SUSE:SLE-15 automatically?

Ah ... I see this is an old Factory submission ... OK let's update SR#322721
Comment 9 Dr. Werner Fink 2024-03-25 12:20:27 UTC
internal SR#322721 is accepted
Comment 10 Maintenance Automation 2024-04-08 12:31:15 UTC
SUSE-SU-2024:1133-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1220061
CVE References: CVE-2023-45918
Maintenance Incident: [SUSE:Maintenance:32649](https://smelt.suse.de/incident/32649/)
Sources used:
openSUSE Leap Micro 5.3 (src):
 ncurses-6.1-150000.5.24.1
openSUSE Leap Micro 5.4 (src):
 ncurses-6.1-150000.5.24.1
openSUSE Leap 15.5 (src):
 ncurses-6.1-150000.5.24.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src):
 ncurses-6.1-150000.5.24.1
SUSE Linux Enterprise Micro 5.3 (src):
 ncurses-6.1-150000.5.24.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src):
 ncurses-6.1-150000.5.24.1
SUSE Linux Enterprise Micro 5.4 (src):
 ncurses-6.1-150000.5.24.1
SUSE Linux Enterprise Micro 5.5 (src):
 ncurses-6.1-150000.5.24.1
Basesystem Module 15-SP5 (src):
 ncurses-6.1-150000.5.24.1
Development Tools Module 15-SP5 (src):
 ncurses-6.1-150000.5.24.1
Legacy Module 15-SP5 (src):
 ncurses-6.1-150000.5.24.1
SUSE Linux Enterprise Micro 5.1 (src):
 ncurses-6.1-150000.5.24.1
SUSE Linux Enterprise Micro 5.2 (src):
 ncurses-6.1-150000.5.24.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src):
 ncurses-6.1-150000.5.24.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Maintenance Automation 2024-04-08 12:31:18 UTC
SUSE-SU-2024:1132-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1220061
CVE References: CVE-2023-45918
Maintenance Incident: [SUSE:Maintenance:32650](https://smelt.suse.de/incident/32650/)
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 ncurses-5.9-88.1
SUSE Linux Enterprise Server 12 SP5 (src):
 ncurses-5.9-88.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 ncurses-5.9-88.1
SUSE Linux Enterprise Software Development Kit 12 SP5 (src):
 ncurses-5.9-88.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.