Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 29 Apr 2002 12:46:49 -0400 (EDT)
From:      Trevor Johnson <trevor@jpj.net>
To:        security-officer@freebsd.org
Cc:        security@freebsd.org
Subject:   Re: [SECURITY] [DSA-113-1] New ncurses packages available (fwd)
Message-ID:  <20020429123756.O28880-100000@blues.jpj.net>
In-Reply-To: <20020228081318.E12519-100000@blues.jpj.net>

next in thread | previous in thread | raw e-mail | index | archive | help
The new ncurses has not yet been imported into FreeBSD.

The latest ncurses sources may be obtained by taking a patch from
ftp://invisible-island.net/ncurses/5.2/ and applying it to the contents of
ftp://invisible-island.net/ncurses/ncurses-5.2.tar.gz .

On Thu, 28 Feb 2002, Trevor Johnson wrote:

> I notice that advisory FreeBSD-SA-00:68 was last revised in November of
> 2000 and that the ncurses in FreeBSD is still at version 5.0 990821.
> --
> Trevor Johnson
>
> ---------- Forwarded message ----------
> Date: Mon, 18 Feb 2002 19:36:38 -0500
> From: Daniel Jacobowitz <dan@debian.org>
> Reply-To: security@debian.org
> To: debian-security-announce@lists.debian.org
> Subject: [SECURITY] [DSA-113-1] New ncurses packages available
> Resent-Date: 19 Feb 2002 00:36:44 -0000
> Resent-From: debian-security-announce@lists.debian.org
> Resent-cc: recipient list not shown: ;
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> - ---------------------------------------------------------------------------
> Debian Security Advisory DSA 113-1                     security@debian.org
> http://www.debian.org/security/                          Daniel Jacobowitz
> February 18th, 2002
> - ---------------------------------------------------------------------------
>
> Package        : ncurses
> Vulnerability  : buffer overflow
> Problem-Type   : local
> Debian-specific: no
>
> Several buffer overflows were fixed in the "ncurses" library in November
> 2000.  Unfortunately, one was missed.  This can lead to crashes when using
> ncurses applications in large windows.
>
> The Common Vulnerabilities and Exposures project (cve.mitre.org) has
> assigned the name CAN-2002-0062 to this issue.
>
> This problem has been fixed for the stable release of Debian in version
> 5.0-6.0potato2.  The testing and unstable releases contain ncurses 5.2,
> which is not affected by this problem.
>
> There are no known exploits for this problem, but we recommend that all
> users upgrade ncurses immediately.
>
>
> wget url
> 	will fetch the file for you
> dpkg -i file.deb
>         will install the referenced file.
>
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
>
> apt-get update
>         will update the internal database
> apt-get upgrade
>         will install corrected packages
>
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
>
>
> Debian GNU/Linux 2.2 alias potato
> - -------------------------------------
>
>   Source archives:
>     http://security.debian.org/dists/potato/updates/main/source/ncurses_5.0-6.0potato2.diff.gz
>       MD5 checksum: 2c0c40c35de8b07b7649574ce308611a
>     http://security.debian.org/dists/potato/updates/main/source/ncurses_5.0-6.0potato2.dsc
>       MD5 checksum: caf2a7ccfc67675263f55100793f0cad
>     http://security.debian.org/dists/potato/updates/main/source/ncurses_5.0.orig.tar.gz
>       MD5 checksum: 0fa25059bc5e1e947f3109a3a168e976
>
>   Architecture independent archives:
>     http://security.debian.org/dists/potato/updates/main/binary-all/ncurses-base_5.0-6.0potato2_all.deb
>       MD5 checksum: 0ca630424256eb2940728a6728f01a3c
>     http://security.debian.org/dists/potato/updates/main/binary-all/ncurses-term_5.0-6.0potato2_all.deb
>       MD5 checksum: 4bc592757f97d4569fac57a0ccbd7588
>
>   Alpha architecture:
>     http://security.debian.org/dists/potato/updates/main/binary-alpha/libncurses5-dbg_5.0-6.0potato2_alpha.deb
>       MD5 checksum: 08c293eeeedbdd93277fbe6994c52225
>     http://security.debian.org/dists/potato/updates/main/binary-alpha/libncurses5-dev_5.0-6.0potato2_alpha.deb
>       MD5 checksum: e9e3a19ac97ac68209fc276db2063bec
>     http://security.debian.org/dists/potato/updates/main/binary-alpha/libncurses5_5.0-6.0potato2_alpha.deb
>       MD5 checksum: c4bed7dc7d38816a522fe9967c474b35
>     http://security.debian.org/dists/potato/updates/main/binary-alpha/ncurses-bin_5.0-6.0potato2_alpha.deb
>       MD5 checksum: 457492010fcce2cea5443cafd94ceace
>
>   ARM architecture:
>     http://security.debian.org/dists/potato/updates/main/binary-arm/libncurses5-dbg_5.0-6.0potato2_arm.deb
>       MD5 checksum: 6b89760ebaef6f627a25f243abd40699
>     http://security.debian.org/dists/potato/updates/main/binary-arm/libncurses5-dev_5.0-6.0potato2_arm.deb
>       MD5 checksum: 8340e7bf13a1c1ae6fe14306e630da46
>     http://security.debian.org/dists/potato/updates/main/binary-arm/libncurses5_5.0-6.0potato2_arm.deb
>       MD5 checksum: 67774c92c2297c97ad014a1cbec541c8
>     http://security.debian.org/dists/potato/updates/main/binary-arm/ncurses-bin_5.0-6.0potato2_arm.deb
>       MD5 checksum: 82aacabc17d3229604bf85c0406bef43
>
>   Intel ia32 architecture:
>     http://security.debian.org/dists/potato/updates/main/binary-i386/libncurses5-dbg_5.0-6.0potato2_i386.deb
>       MD5 checksum: 5c43981090144c8c19d37f455056dac9
>     http://security.debian.org/dists/potato/updates/main/binary-i386/libncurses5-dev_5.0-6.0potato2_i386.deb
>       MD5 checksum: 476bd2329a991423df2fadf7097c710a
>     http://security.debian.org/dists/potato/updates/main/binary-i386/libncurses5_5.0-6.0potato2_i386.deb
>       MD5 checksum: ca7e31dc8bb7b2132732749a08ef520b
>     http://security.debian.org/dists/potato/updates/main/binary-i386/ncurses-bin_5.0-6.0potato2_i386.deb
>       MD5 checksum: 2029230b29eab7e755b0a533eff7fe10
>
>   Motorola 680x0 architecture:
>     http://security.debian.org/dists/potato/updates/main/binary-m68k/libncurses5-dbg_5.0-6.0potato2_m68k.deb
>       MD5 checksum: 37ea741f71e3362de572ac55d357c36f
>     http://security.debian.org/dists/potato/updates/main/binary-m68k/libncurses5-dev_5.0-6.0potato2_m68k.deb
>       MD5 checksum: 02277c7a29dcfd1eae01c8ee99487349
>     http://security.debian.org/dists/potato/updates/main/binary-m68k/libncurses5_5.0-6.0potato2_m68k.deb
>       MD5 checksum: 410c3aafee6114db71fefa4b0e8d9336
>     http://security.debian.org/dists/potato/updates/main/binary-m68k/ncurses-bin_5.0-6.0potato2_m68k.deb
>       MD5 checksum: 0c29eb0df9813e96ee1af762814c60ff
>
>   PowerPC architecture:
>     http://security.debian.org/dists/potato/updates/main/binary-powerpc/libncurses5-dbg_5.0-6.0potato2_powerpc.deb
>       MD5 checksum: 5ae0e15e15934c4d99478bcf8daf4ab4
>     http://security.debian.org/dists/potato/updates/main/binary-powerpc/libncurses5-dev_5.0-6.0potato2_powerpc.deb
>       MD5 checksum: bb1c6f8484483cf51d37e433a394efb3
>     http://security.debian.org/dists/potato/updates/main/binary-powerpc/libncurses5_5.0-6.0potato2_powerpc.deb
>       MD5 checksum: aa35b395dc84b64deea5ce950104f0bd
>     http://security.debian.org/dists/potato/updates/main/binary-powerpc/ncurses-bin_5.0-6.0potato2_powerpc.deb
>       MD5 checksum: c4256989a725e4d0afec510e1564ef8d
>
>   Sun Sparc architecture:
>     http://security.debian.org/dists/potato/updates/main/binary-sparc/libncurses5-dbg_5.0-6.0potato2_sparc.deb
>       MD5 checksum: 95059d9006f27b8ad479ffd5f2495a90
>     http://security.debian.org/dists/potato/updates/main/binary-sparc/libncurses5-dev_5.0-6.0potato2_sparc.deb
>       MD5 checksum: beda2b108219a348ae8330916bebd6de
>     http://security.debian.org/dists/potato/updates/main/binary-sparc/libncurses5_5.0-6.0potato2_sparc.deb
>       MD5 checksum: 69979bab9a9b2716ea833221a7003a28
>     http://security.debian.org/dists/potato/updates/main/binary-sparc/ncurses-bin_5.0-6.0potato2_sparc.deb
>       MD5 checksum: 2b516705006d27b0808a0aea77f4b724
>
> - ----------------------------------------------------------------------------------
> For apt-get: deb http://security.debian.org/ stable/updates main
> For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
> Mailing list: debian-security-announce@lists.debian.org
> Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>;
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.0.6 (GNU/Linux)
> Comment: For info see http://www.gnupg.org
>
> iQCVAwUBPHGd9z5fjwqn/34JAQFp7gP/aanLFr70Fttn/kETgEV67MBR68B1sgQv
> 5p2G4iM9DO5SlVGWPz+VS2q92eNZmrwl2WKI7+hu2v3X/23fStRzKJRkCijQKYTM
> C0p5R76mIuDqZR0uwsJVwPwDvDL8gaeoul8p8r8PuwWDQj/6Skwq8UbBuMHDp1uL
> DgMswLMUQt8=
> =GYGr
> -----END PGP SIGNATURE-----
>
>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020429123756.O28880-100000>