Information on source package ncurses

Available versions

ReleaseVersion
jessie5.9+20140913-1+deb8u3
stretch6.0+20161126-1+deb9u2
buster6.1+20181013-2
bullseye6.1+20190803-1
sid6.1+20190803-1

Open issues

BugjessiestretchbusterbullseyesidDescription
CVE-2018-19211vulnerable (no DSA)vulnerable (no DSA)fixedfixedfixedIn ncurses 6.1, there is a NULL pointer dereference at function _nc_pa ...
CVE-2018-10754vulnerable (no DSA)vulnerable (no DSA)fixedfixedfixedIn ncurses before 6.1.20180414, there is a NULL Pointer Dereference in ...

Resolved issues

BugDescription
CVE-2018-19217** DISPUTED ** In ncurses, possibly a 6.x version, there is a NULL poi ...
CVE-2017-16879Stack-based buffer overflow in the _nc_write_entry function in tinfo/w ...
CVE-2017-13734There is an illegal address access in the _nc_safe_strcat function in ...
CVE-2017-13733There is an illegal address access in the fmt_entry function in progs/ ...
CVE-2017-13732There is an illegal address access in the function dump_uses() in prog ...
CVE-2017-13731There is an illegal address access in the function postprocess_termcap ...
CVE-2017-13730There is an illegal address access in the function _nc_read_entry_sour ...
CVE-2017-13729There is an illegal address access in the _nc_save_str function in all ...
CVE-2017-13728There is an infinite loop in the next_char function in comp_scan.c in ...
CVE-2017-11113In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_e ...
CVE-2017-11112In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the ...
CVE-2017-10685In ncurses 6.0, there is a format string vulnerability in the fmt_entr ...
CVE-2017-10684In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entr ...

Search for package or bug name: Reporting problems