First published: Tue Oct 24 2023(Updated: )
It was discovered that ncurses could be made to read out of bounds. An attacker could possibly use this issue to cause a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/lib32ncurses5 | <6.1-1ubuntu1.18.04.1+esm1 | 6.1-1ubuntu1.18.04.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/lib32ncursesw5 | <6.1-1ubuntu1.18.04.1+esm1 | 6.1-1ubuntu1.18.04.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/lib32tinfo5 | <6.1-1ubuntu1.18.04.1+esm1 | 6.1-1ubuntu1.18.04.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/lib64ncurses5 | <6.1-1ubuntu1.18.04.1+esm1 | 6.1-1ubuntu1.18.04.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/lib64tinfo5 | <6.1-1ubuntu1.18.04.1+esm1 | 6.1-1ubuntu1.18.04.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libncurses5 | <6.1-1ubuntu1.18.04.1+esm1 | 6.1-1ubuntu1.18.04.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libncursesw5 | <6.1-1ubuntu1.18.04.1+esm1 | 6.1-1ubuntu1.18.04.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libtinfo5 | <6.1-1ubuntu1.18.04.1+esm1 | 6.1-1ubuntu1.18.04.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libx32ncurses5 | <6.1-1ubuntu1.18.04.1+esm1 | 6.1-1ubuntu1.18.04.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libx32ncursesw5 | <6.1-1ubuntu1.18.04.1+esm1 | 6.1-1ubuntu1.18.04.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libx32tinfo5 | <6.1-1ubuntu1.18.04.1+esm1 | 6.1-1ubuntu1.18.04.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/ncurses-bin | <6.1-1ubuntu1.18.04.1+esm1 | 6.1-1ubuntu1.18.04.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/lib32ncurses5 | <6.0+20160213-1ubuntu1+esm4 | 6.0+20160213-1ubuntu1+esm4 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/lib32ncursesw5 | <6.0+20160213-1ubuntu1+esm4 | 6.0+20160213-1ubuntu1+esm4 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/lib32tinfo5 | <6.0+20160213-1ubuntu1+esm4 | 6.0+20160213-1ubuntu1+esm4 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/lib64ncurses5 | <6.0+20160213-1ubuntu1+esm4 | 6.0+20160213-1ubuntu1+esm4 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/lib64tinfo5 | <6.0+20160213-1ubuntu1+esm4 | 6.0+20160213-1ubuntu1+esm4 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libncurses5 | <6.0+20160213-1ubuntu1+esm4 | 6.0+20160213-1ubuntu1+esm4 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libncursesw5 | <6.0+20160213-1ubuntu1+esm4 | 6.0+20160213-1ubuntu1+esm4 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libtinfo5 | <6.0+20160213-1ubuntu1+esm4 | 6.0+20160213-1ubuntu1+esm4 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libx32ncurses5 | <6.0+20160213-1ubuntu1+esm4 | 6.0+20160213-1ubuntu1+esm4 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libx32ncursesw5 | <6.0+20160213-1ubuntu1+esm4 | 6.0+20160213-1ubuntu1+esm4 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libx32tinfo5 | <6.0+20160213-1ubuntu1+esm4 | 6.0+20160213-1ubuntu1+esm4 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/ncurses-bin | <6.0+20160213-1ubuntu1+esm4 | 6.0+20160213-1ubuntu1+esm4 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/lib32ncurses5 | <5.9+20140118-1ubuntu1+esm4 | 5.9+20140118-1ubuntu1+esm4 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/lib32ncursesw5 | <5.9+20140118-1ubuntu1+esm4 | 5.9+20140118-1ubuntu1+esm4 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/lib32tinfo5 | <5.9+20140118-1ubuntu1+esm4 | 5.9+20140118-1ubuntu1+esm4 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/lib64ncurses5 | <5.9+20140118-1ubuntu1+esm4 | 5.9+20140118-1ubuntu1+esm4 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/lib64tinfo5 | <5.9+20140118-1ubuntu1+esm4 | 5.9+20140118-1ubuntu1+esm4 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/libncurses5 | <5.9+20140118-1ubuntu1+esm4 | 5.9+20140118-1ubuntu1+esm4 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/libncursesw5 | <5.9+20140118-1ubuntu1+esm4 | 5.9+20140118-1ubuntu1+esm4 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/libtinfo5 | <5.9+20140118-1ubuntu1+esm4 | 5.9+20140118-1ubuntu1+esm4 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/libx32ncurses5 | <5.9+20140118-1ubuntu1+esm4 | 5.9+20140118-1ubuntu1+esm4 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/libx32ncursesw5 | <5.9+20140118-1ubuntu1+esm4 | 5.9+20140118-1ubuntu1+esm4 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/libx32tinfo5 | <5.9+20140118-1ubuntu1+esm4 | 5.9+20140118-1ubuntu1+esm4 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/ncurses-bin | <5.9+20140118-1ubuntu1+esm4 | 5.9+20140118-1ubuntu1+esm4 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID USN-6451-1 relates to ncurses in Ubuntu, where it can read out of bounds, potentially leading to a denial of service.
The severity of USN-6451-1 is assessed as high due to the potential impact on system stability and availability.
To fix USN-6451-1, update the affected packages to the recommended version 6.1-1ubuntu1.18.04.1+esm1 or higher.
USN-6451-1 affects Ubuntu 18.04 and earlier versions that include the vulnerable ncurses packages.
Yes, USN-6451-1 could potentially be exploited remotely, enabling attackers to cause a denial of service.