Bug 1154037 - (CVE-2019-17595) VUL-0: CVE-2019-17595: ncurses: heap-based buffer over-read in fmt_entry function in tinfo/comp_hash.c
(CVE-2019-17595)
VUL-0: CVE-2019-17595: ncurses: heap-based buffer over-read in fmt_entry func...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/244903/
CVSSv3:SUSE:CVE-2019-17595:4.0:(AV:L/...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-10-15 10:01 UTC by Alexander Bergmann
Modified: 2020-04-28 12:58 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
CVE-2019-17595.patch (834 bytes, text/plain)
2019-10-15 10:34 UTC, Dr. Werner Fink
Details

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Dr. Werner Fink 2019-10-15 10:34:50 UTC
Created attachment 821521 [details]
CVE-2019-17595.patch

The question rises if this one fits all previous versions
Comment 4 Swamp Workflow Management 2019-10-16 11:17:58 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2019-10-30.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/64389
Comment 5 Dr. Werner Fink 2019-10-23 07:58:26 UTC
done
Comment 6 Swamp Workflow Management 2019-11-18 20:15:25 UTC
SUSE-SU-2019:2997-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1103320,1154036,1154037
CVE References: CVE-2019-17594,CVE-2019-17595
Sources used:
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    ncurses-6.1-5.6.2
SUSE Linux Enterprise Module for Legacy Software 15-SP1 (src):    ncurses-6.1-5.6.2
SUSE Linux Enterprise Module for Legacy Software 15 (src):    ncurses-6.1-5.6.2
SUSE Linux Enterprise Module for Development Tools 15-SP1 (src):    ncurses-6.1-5.6.2
SUSE Linux Enterprise Module for Development Tools 15 (src):    ncurses-6.1-5.6.2
SUSE Linux Enterprise Module for Basesystem 15-SP1 (src):    ncurses-6.1-5.6.2
SUSE Linux Enterprise Module for Basesystem 15 (src):    ncurses-6.1-5.6.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2019-11-23 23:11:27 UTC
openSUSE-SU-2019:2551-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1103320,1154036,1154037
CVE References: CVE-2019-17594,CVE-2019-17595
Sources used:
openSUSE Leap 15.1 (src):    ncurses-6.1-lp151.6.3.1
Comment 8 Swamp Workflow Management 2019-11-23 23:14:47 UTC
openSUSE-SU-2019:2550-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1103320,1154036,1154037
CVE References: CVE-2019-17594,CVE-2019-17595
Sources used:
openSUSE Leap 15.0 (src):    ncurses-6.1-lp150.9.1
Comment 9 Swamp Workflow Management 2019-11-28 20:17:16 UTC
SUSE-SU-2019:3094-1: An update that solves three vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1131830,1134550,1154036,1154037
CVE References: CVE-2018-10754,CVE-2019-17594,CVE-2019-17595
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    ncurses-5.9-69.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    ncurses-5.9-69.1
SUSE Linux Enterprise Server 12-SP5 (src):    ncurses-5.9-69.1
SUSE Linux Enterprise Server 12-SP4 (src):    ncurses-5.9-69.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    ncurses-5.9-69.1
SUSE CaaS Platform 3.0 (src):    ncurses-5.9-69.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Alexandros Toptsoglou 2020-04-28 12:58:49 UTC
Done