Descriptionncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1034372

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ncurses (PTS)buster6.1+20181013-2+deb10u2vulnerable
buster (security)6.1+20181013-2+deb10u3vulnerable
sid, trixie6.4+20230625-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[bullseye] - ncurses <no-dsa> (Minor issue)
[buster] - ncurses <no-dsa> (Minor issue);a=commitdiff;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
6.4-3 upload configures with "--disable-root-environ" to disallow loading of
custom terminfo entries in setuid/setgid programs, mitigating the impact of
the vulnerability.

Search for package or bug name: Reporting problems