{"schema_version": "1.3.1", "id": "RLSA-2021:4426", "modified": "2023-02-02T12:52:03.171656Z", "published": "2021-11-09T09:21:17Z", "related": ["CVE-2019-17594", "CVE-2019-17595"], "summary": "Moderate: ncurses security update", "details": "The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.\n\nSecurity Fix(es):\n\n* ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c (CVE-2019-17594)\n\n* ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c (CVE-2019-17595)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}], "affected": [{"package": {"ecosystem": "Rocky Linux:8", "name": "ncurses", "purl": "pkg:rpm/rocky-linux/ncurses?distro=rocky-linux-8&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:6.1-9.20180224.el8"}], "database_specific": {"yum_repository": "BaseOS"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2021:4426"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766617"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766745"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}