Bug 2300290 (CVE-2023-45918)
Summary: | CVE-2023-45918 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Avinash Hanwate <ahanwate> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | bmason, bpg168g, jorton, mlichvar, prodsec-dev |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | Flags: | jorton:
needinfo?
(ahanwate) bpg168g: needinfo? (prodsec-dev) |
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in ncurses. Affected versions of this package contain a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2300292, 2300293 | ||
Bug Blocks: |
Description
Avinash Hanwate
2024-07-29 06:55:03 UTC
I don't see the security impact here. terminfo files are trusted like executables. If an attacker can supply their own terminfo file, they can always prevent the application from working correctly. This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.16 Via RHSA-2024:5107 https://access.redhat.com/errata/RHSA-2024:5107 This issue is also affecting the RedHat UBI images. Currently checked in latest images in * ubi8: https://catalog.redhat.com/software/containers/ubi8/ubi/5c359854d70cc534b3a3784e contains: ncurses 6.1-10.20180224 * ubi9: https://catalog.redhat.com/software/containers/ubi9/ubi/615bcf606feffc5384e8452e contains: ncurses 6.2-10.20210508 The UBI images are not listed in the Affected Products in the CVE - https://access.redhat.com/security/cve/CVE-2023-45918. But as they are based on the RHEL, I am guessing there won't be any patch for ubi8 image ('cause ubi8 is based on RHEL8 - which is mentioned as Won't Fix in the CVE) But perhaps ubi9 a patch will be released when the RHEL9 patch is created. Is this understanding correct ? Thank you |