Bugzilla – Bug 1220061
VUL-1: CVE-2023-45918: ncurses: NULL pointer dereference via corrupted xterm-256color file
Last modified: 2024-04-08 12:31:18 UTC
ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45918 https://www.cve.org/CVERecord?id=CVE-2023-45918 https://lists.gnu.org/archive/html/bug-ncurses/2023-06/msg00005.html
This should be fixed with ncurses-6.4-20230615.patch 20230615 + modify _nc_read_file_entry() to show relevant filename in warnings. + improve checks in convert_string() for corrupt terminfo entry (report and test-case by Gregory James Duck).
Not sure if this is really required for SLE-12 (ncurses 5.9) or SLE-15 (ncurses 6.1) ... if not, why this bug report happend as this is a long time fixed in openSUSE Factory.
No answer ... I still not know if the SR for SLE-12 and SLE-15 are really required
(In reply to Dr. Werner Fink from comment #4) > No answer ... I still not know if the SR for SLE-12 and SLE-15 are really > required I could not reproduce the bug for SLE-12, but I could for SUSE:SLE-15:Update. We also need a submission for SUSE:ALP:Source:Standard:1.0.
(In reply to Carlos López from comment #5) > (In reply to Dr. Werner Fink from comment #4) > > No answer ... I still not know if the SR for SLE-12 and SLE-15 are really > > required > > I could not reproduce the bug for SLE-12, but I could for > SUSE:SLE-15:Update. We also need a submission for > SUSE:ALP:Source:Standard:1.0. Shouldn't SUSE:ALP:Source:Standard:1.0 be updated with latest Update for SUSE:SLE-15 automatically?
(In reply to Dr. Werner Fink from comment #6) > (In reply to Carlos López from comment #5) > > (In reply to Dr. Werner Fink from comment #4) > > > No answer ... I still not know if the SR for SLE-12 and SLE-15 are really > > > required > > > > I could not reproduce the bug for SLE-12, but I could for > > SUSE:SLE-15:Update. We also need a submission for > > SUSE:ALP:Source:Standard:1.0. > > Shouldn't SUSE:ALP:Source:Standard:1.0 be updated with latest Update for > SUSE:SLE-15 automatically? Not as far as I know. You can even see they are not synchronized right now by looking at the changes file.
(In reply to Dr. Werner Fink from comment #6) > (In reply to Carlos López from comment #5) > > (In reply to Dr. Werner Fink from comment #4) > > > No answer ... I still not know if the SR for SLE-12 and SLE-15 are really > > > required > > > > I could not reproduce the bug for SLE-12, but I could for > > SUSE:SLE-15:Update. We also need a submission for > > SUSE:ALP:Source:Standard:1.0. > > Shouldn't SUSE:ALP:Source:Standard:1.0 be updated with latest Update for > SUSE:SLE-15 automatically? Ah ... I see this is an old Factory submission ... OK let's update SR#322721
internal SR#322721 is accepted
SUSE-SU-2024:1133-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1220061 CVE References: CVE-2023-45918 Maintenance Incident: [SUSE:Maintenance:32649](https://smelt.suse.de/incident/32649/) Sources used: openSUSE Leap Micro 5.3 (src): ncurses-6.1-150000.5.24.1 openSUSE Leap Micro 5.4 (src): ncurses-6.1-150000.5.24.1 openSUSE Leap 15.5 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro 5.3 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro 5.4 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro 5.5 (src): ncurses-6.1-150000.5.24.1 Basesystem Module 15-SP5 (src): ncurses-6.1-150000.5.24.1 Development Tools Module 15-SP5 (src): ncurses-6.1-150000.5.24.1 Legacy Module 15-SP5 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro 5.1 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro 5.2 (src): ncurses-6.1-150000.5.24.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): ncurses-6.1-150000.5.24.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:1132-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1220061 CVE References: CVE-2023-45918 Maintenance Incident: [SUSE:Maintenance:32650](https://smelt.suse.de/incident/32650/) Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): ncurses-5.9-88.1 SUSE Linux Enterprise Server 12 SP5 (src): ncurses-5.9-88.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): ncurses-5.9-88.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): ncurses-5.9-88.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.