<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2023-0050</id>
    <title>An update for ncurses is now available for HCE 1.1</title>
    <severity>Critical</severity>
    <release>HCE 1.1</release>
    <issued date="2023-01-05 02:56:01"/>
    <updated date="2023-01-05 02:56:01"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-13728" id="CVE-2017-13728" title="CVE-2017-13728 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-13732" id="CVE-2017-13732" title="CVE-2017-13732 Base Score: 6.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-13730" id="CVE-2017-13730" title="CVE-2017-13730 Base Score: 6.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-13731" id="CVE-2017-13731" title="CVE-2017-13731 Base Score: 6.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2019-17595" id="CVE-2019-17595" title="CVE-2019-17595 Base Score: 5.4 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2019-17594" id="CVE-2019-17594" title="CVE-2019-17594 Base Score: 5.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2018-10754" id="CVE-2018-10754" title="CVE-2018-10754 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-13729" id="CVE-2017-13729" title="CVE-2017-13729 Base Score: 6.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-13734" id="CVE-2017-13734" title="CVE-2017-13734 Base Score: 6.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-10684" id="CVE-2017-10684" title="CVE-2017-10684 Base Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458" id="CVE-2022-29458" title="CVE-2022-29458 Base Score: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-10685" id="CVE-2017-10685" title="CVE-2017-10685 Base Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-13733" id="CVE-2017-13733" title="CVE-2017-13733 Base Score: 6.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack. (CVE-2017-13728)

There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack. (CVE-2017-13732)

There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack. (CVE-2017-13730)

There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack. (CVE-2017-13731)

There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012. (CVE-2019-17595)

There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012. (CVE-2019-17594)

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. (CVE-2018-10754)

There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack. (CVE-2017-13729)

There is an illegal address access in the _nc_safe_strcat function in strings.c in ncurses 6.0 that will lead to a remote denial of service attack. (CVE-2017-13734)

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack. (CVE-2017-10684)

ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library. (CVE-2022-29458)

In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack. (CVE-2017-10685)

There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack. (CVE-2017-13733)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="ncurses">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="ncurses" version="5.9" release="15.20130511.hce1c">
          <filename>ncurses-5.9-15.20130511.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="ncurses-base" version="5.9" release="15.20130511.hce1c">
          <filename>ncurses-base-5.9-15.20130511.hce1c.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="ncurses-devel" version="5.9" release="15.20130511.hce1c">
          <filename>ncurses-devel-5.9-15.20130511.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="ncurses-libs" version="5.9" release="15.20130511.hce1c">
          <filename>ncurses-libs-5.9-15.20130511.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="ncurses-term" version="5.9" release="15.20130511.hce1c">
          <filename>ncurses-term-5.9-15.20130511.hce1c.noarch.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
