First published: Mon Jul 29 2024(Updated: )
ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c. <a href="https://lists.gnu.org/archive/html/bug-ncurses/2023-06/msg00005.html">https://lists.gnu.org/archive/html/bug-ncurses/2023-06/msg00005.html</a> <a href="https://security.netapp.com/advisory/ntap-20240315-0006/">https://security.netapp.com/advisory/ntap-20240315-0006/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ncurses | >=6.4<6.4-20230611 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2300290 is considered high due to the potential for denial of service caused by a NULL pointer dereference.
To fix REDHAT-BUG-2300290, you should update to a version of ncurses that is later than 6.4-20230611.
Versions of ncurses from 6.4 before 6.4-20230611 inclusive are affected by REDHAT-BUG-2300290.
The component involved in REDHAT-BUG-2300290 is the tgetstr function in the tinfo/lib_termcap.c file of ncurses.
Currently, the most effective workaround for REDHAT-BUG-2300290 is to upgrade to a patched version of ncurses.