QID 354130

Date Published: 2022-12-08

QID 354130: Amazon Linux Security Advisory for ncurses : ALAS2-2022-1893

The ncurses package (tic) is susceptible to a heap overflow on crafted input.
When the terminfo entry-description compiler processes input, proper bounds checking was not enforced leading to this software flaw.
The highest threat from this vulnerability is system availability. (
( CVE-2021-39537) a segmentation fault vulnerability was found in ncurses's convert_strings() function of tinfo/read_entry.c file.
This flaw occurs due to corrupted terminfo data, triggering an out-of-bounds read error. (
( CVE-2022-29458)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2022-1893 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354130

    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2022-1893 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2022-1893.html