Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 625830 (CVE-2017-10684, CVE-2017-10685)

Summary: <sys-libs/ncurses-6.1: Multiple vulnerabilities
Product: Gentoo Security Reporter: Aleksandr Wagner (Kivak) <alwag>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: base-system, sudormrfhalt
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: A1 [glsa+ cve]
Package list:
Runtime testing required: ---
Bug Depends on: 639706, 648114    
Bug Blocks:    

Description Aleksandr Wagner (Kivak) 2017-07-21 08:31:59 UTC
CVE-2017-10684 (https://nvd.nist.gov/vuln/detail/CVE-2017-10684)

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1464687
https://bugzilla.redhat.com/show_bug.cgi?id=1473302

Upstream patch:
https://lists.gnu.org/archive/html/bug-ncurses/2017-07/msg00001.html
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2017-10-23 17:55:21 UTC
CVE-2017-10685 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10685):
  In ncurses 6.0, there is a format string vulnerability in the fmt_entry
  function. A crafted input will lead to a remote arbitrary code execution
  attack.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2018-04-17 18:19:57 UTC
This issue was resolved and addressed in
 GLSA 201804-13 at https://security.gentoo.org/glsa/201804-13
by GLSA coordinator Aaron Bauman (b-man).