CVE-2017-16879 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-16879): Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.
@Maintainers please call for stabilization when ready. Thank you
@arches, please stabilize.
amd64 stable
ia64 stable
ppc stable
ppc64 stable
x86 stable
commit 1fa251eb8276ed0b1d72ca836f560f21a343c079 Author: Rolf Eike Beer <eike@sf-mail.de> Date: Tue Mar 27 20:23:43 2018 +0200 sys-libs/ncurses: stable 6.1-r2 for sparc, bug #639706
arm64 stable
commit acb2cee0e20bd3943186234a8ebba17540daf7e6 Author: Jeroen Roovers <jer@gentoo.org> Date: Sat Mar 31 11:38:29 2018 +0200 sys-libs/ncurses: Stable for HPPA too.
alpha stable
arm stable
exp arches removed. Dependent bug 651644 should not block this. GLSA request filed.
(In reply to Aaron Bauman from comment #13) > exp arches removed. > > Dependent bug 651644 should not block this. > > GLSA request filed. Do not remove them at least from system-wede packages, hurts noone
m68k/s390/sh stable
This issue was resolved and addressed in GLSA 201804-13 at https://security.gentoo.org/glsa/201804-13 by GLSA coordinator Aaron Bauman (b-man).
re-opened for cleanup/masking.
@maintainer(s), please drop vulnerable. Thank you. Michael Boyle Security Padawan
(In reply to Michael Boyle from comment #18) > @maintainer(s), please drop vulnerable. Thank you. > > Michael Boyle > Security Padawan Already done. See commit c94776f9bbcb5e37c8440b59770b8515bbe61bac
All done, repository is clean.