Denial of Service in ncurses
ID: | SUSE-SU-2018:4000-1 |
Distribution: | SUSE |
Plattformen: | SUSE Linux Enterprise Module for Basesystem 15, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Legacy Software 15 |
Datum: | Fr, 7. Dezember 2018, 13:05 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211 |
Applikationen: | ncurses |
Originalnachricht |
|
SUSE Security Update: Security update for ncurses ______________________________________________________________________________ Announcement ID: SUSE-SU-2018:4000-1 Rating: important References: #1103320 #1115929 Cross-References: CVE-2018-19211 Affected Products: SUSE Linux Enterprise Module for Legacy Software 15 SUSE Linux Enterprise Module for Development Tools 15 SUSE Linux Enterprise Module for Basesystem 15 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for ncurses fixes the following issues: Security issue fixed: - CVE-2018-19211: Fixed denial of service issue that was triggered by a NULL pointer dereference at function _nc_parse_entry (bsc#1115929). Non-security issue fixed: - Remove scree.xterm from terminfo data base as with this screen uses fallback TERM=screen (bsc#1103320). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Legacy Software 15: zypper in -t patch SUSE-SLE-Module-Legacy-15-2018-2861=1 - SUSE Linux Enterprise Module for Development Tools 15: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-2018-2861=1 - SUSE Linux Enterprise Module for Basesystem 15: zypper in -t patch SUSE-SLE-Module-Basesystem-15-2018-2861=1 Package List: - SUSE Linux Enterprise Module for Legacy Software 15 (aarch64 ppc64le s390x x86_64): libncurses5-6.1-5.3.1 libncurses5-debuginfo-6.1-5.3.1 ncurses-debugsource-6.1-5.3.1 ncurses5-devel-6.1-5.3.1 - SUSE Linux Enterprise Module for Legacy Software 15 (x86_64): libncurses5-32bit-6.1-5.3.1 libncurses5-32bit-debuginfo-6.1-5.3.1 - SUSE Linux Enterprise Module for Development Tools 15 (x86_64): ncurses-debugsource-6.1-5.3.1 ncurses-devel-32bit-6.1-5.3.1 ncurses-devel-32bit-debuginfo-6.1-5.3.1 - SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x x86_64): libncurses6-6.1-5.3.1 libncurses6-debuginfo-6.1-5.3.1 ncurses-debugsource-6.1-5.3.1 ncurses-devel-6.1-5.3.1 ncurses-devel-debuginfo-6.1-5.3.1 ncurses-utils-6.1-5.3.1 ncurses-utils-debuginfo-6.1-5.3.1 tack-6.1-5.3.1 tack-debuginfo-6.1-5.3.1 terminfo-6.1-5.3.1 terminfo-base-6.1-5.3.1 terminfo-iterm-6.1-5.3.1 terminfo-screen-6.1-5.3.1 - SUSE Linux Enterprise Module for Basesystem 15 (x86_64): libncurses6-32bit-6.1-5.3.1 libncurses6-32bit-debuginfo-6.1-5.3.1 References: https://www.suse.com/security/cve/CVE-2018-19211.html https://bugzilla.suse.com/1103320 https://bugzilla.suse.com/1115929 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates |