First published: Thu Mar 07 2024(Updated: )
It was discovered that ncurses incorrectly handled certain function return values, possibly leading to segmentation fault. A local attacker could possibly use this to cause a denial of service (system crash).
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/lib32ncurses5 | <6.1-1ubuntu1.18.04.1+esm2 | 6.1-1ubuntu1.18.04.1+esm2 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/lib32tinfo5 | <6.1-1ubuntu1.18.04.1+esm2 | 6.1-1ubuntu1.18.04.1+esm2 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/lib64ncurses5 | <6.1-1ubuntu1.18.04.1+esm2 | 6.1-1ubuntu1.18.04.1+esm2 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/lib64tinfo5 | <6.1-1ubuntu1.18.04.1+esm2 | 6.1-1ubuntu1.18.04.1+esm2 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/libncurses5 | <6.1-1ubuntu1.18.04.1+esm2 | 6.1-1ubuntu1.18.04.1+esm2 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/libtinfo5 | <6.1-1ubuntu1.18.04.1+esm2 | 6.1-1ubuntu1.18.04.1+esm2 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/libx32ncurses5 | <6.1-1ubuntu1.18.04.1+esm2 | 6.1-1ubuntu1.18.04.1+esm2 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/libx32tinfo5 | <6.1-1ubuntu1.18.04.1+esm2 | 6.1-1ubuntu1.18.04.1+esm2 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/lib32ncurses5 | <6.0+20160213-1ubuntu1+esm5 | 6.0+20160213-1ubuntu1+esm5 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/lib32tinfo5 | <6.0+20160213-1ubuntu1+esm5 | 6.0+20160213-1ubuntu1+esm5 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/lib64ncurses5 | <6.0+20160213-1ubuntu1+esm5 | 6.0+20160213-1ubuntu1+esm5 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/lib64tinfo5 | <6.0+20160213-1ubuntu1+esm5 | 6.0+20160213-1ubuntu1+esm5 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/libncurses5 | <6.0+20160213-1ubuntu1+esm5 | 6.0+20160213-1ubuntu1+esm5 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/libtinfo5 | <6.0+20160213-1ubuntu1+esm5 | 6.0+20160213-1ubuntu1+esm5 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/libx32ncurses5 | <6.0+20160213-1ubuntu1+esm5 | 6.0+20160213-1ubuntu1+esm5 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/libx32tinfo5 | <6.0+20160213-1ubuntu1+esm5 | 6.0+20160213-1ubuntu1+esm5 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/lib32ncurses5 | <5.9+20140118-1ubuntu1+esm5 | 5.9+20140118-1ubuntu1+esm5 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/lib32tinfo5 | <5.9+20140118-1ubuntu1+esm5 | 5.9+20140118-1ubuntu1+esm5 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/lib64ncurses5 | <5.9+20140118-1ubuntu1+esm5 | 5.9+20140118-1ubuntu1+esm5 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/lib64tinfo5 | <5.9+20140118-1ubuntu1+esm5 | 5.9+20140118-1ubuntu1+esm5 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/libncurses5 | <5.9+20140118-1ubuntu1+esm5 | 5.9+20140118-1ubuntu1+esm5 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/libtinfo5 | <5.9+20140118-1ubuntu1+esm5 | 5.9+20140118-1ubuntu1+esm5 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/libx32ncurses5 | <5.9+20140118-1ubuntu1+esm5 | 5.9+20140118-1ubuntu1+esm5 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/libx32tinfo5 | <5.9+20140118-1ubuntu1+esm5 | 5.9+20140118-1ubuntu1+esm5 |
Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6684-1 is classified as a medium severity vulnerability that can potentially lead to a denial of service.
To fix USN-6684-1, you should upgrade to version 6.1-1ubuntu1.18.04.1+esm2 of the affected packages.
The affected packages in USN-6684-1 include lib32ncurses5, lib32tinfo5, lib64ncurses5, lib64tinfo5, libncurses5, and libtinfo5.
A local attacker could exploit USN-6684-1 to cause a segmentation fault and potentially crash the system.
USN-6684-1 affects Ubuntu 18.04 and earlier versions.