SUSE-SU-2017:2076-1: moderate: Security update for ncurses

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Aug 7 10:12:41 MDT 2017


   SUSE Security Update: Security update for ncurses
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:2076-1
Rating:             moderate
References:         #1046853 #1046858 #1047964 #1047965 #1049344 
                    
Cross-References:   CVE-2017-10684 CVE-2017-10685 CVE-2017-11112
                    CVE-2017-11113
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that solves four vulnerabilities and has one
   errata is now available.

Description:

   This update for ncurses fixes the following issues:

   Security issues fixed:
   - CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
   - CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry.
     (bsc#1047965)
   - CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses
     6.0 to avoid broken termcap format (bsc#1046853, bsc#1046858,
     bsc#1049344)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-ncurses-13227=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-ncurses-13227=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-ncurses-13227=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64):

      ncurses-devel-5.6-93.6.1
      tack-5.6-93.6.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (x86_64):

      ncurses-devel-32bit-5.6-93.6.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libncurses5-5.6-93.6.1
      libncurses6-5.6-93.6.1
      ncurses-devel-5.6-93.6.1
      ncurses-utils-5.6-93.6.1
      tack-5.6-93.6.1
      terminfo-5.6-93.6.1
      terminfo-base-5.6-93.6.1

   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

      libncurses5-32bit-5.6-93.6.1
      libncurses6-32bit-5.6-93.6.1
      ncurses-devel-32bit-5.6-93.6.1

   - SUSE Linux Enterprise Server 11-SP4 (ia64):

      libncurses5-x86-5.6-93.6.1
      libncurses6-x86-5.6-93.6.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      ncurses-debuginfo-5.6-93.6.1
      ncurses-debugsource-5.6-93.6.1


References:

   https://www.suse.com/security/cve/CVE-2017-10684.html
   https://www.suse.com/security/cve/CVE-2017-10685.html
   https://www.suse.com/security/cve/CVE-2017-11112.html
   https://www.suse.com/security/cve/CVE-2017-11113.html
   https://bugzilla.suse.com/1046853
   https://bugzilla.suse.com/1046858
   https://bugzilla.suse.com/1047964
   https://bugzilla.suse.com/1047965
   https://bugzilla.suse.com/1049344



More information about the sle-security-updates mailing list