{"id":"MGASA-2018-0001","summary":"Updated ncurses packages fix security vulnerabilities","details":"Possible RCE via stack-based buffer overflow in the fmt_entry function\n(CVE-2017-10684).\n\nPossible RCE with format string vulnerability in the fmt_entry function\n(CVE-2017-10685).\n\nIllegal address access in append_acs (CVE-2017-11112).\n\nDereferencing NULL pointer in _nc_parse_entry (CVE-2017-11113).\n","modified":"2026-01-31T17:40:36.893615Z","published":"2018-01-01T01:17:34Z","related":["CVE-2017-10684","CVE-2017-10685","CVE-2017-11112","CVE-2017-11113"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0001.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=21197"},{"type":"REPORT","url":"https://lists.opensuse.org/opensuse-updates/2017-07/msg00071.html"},{"type":"REPORT","url":"https://lists.opensuse.org/opensuse-updates/2017-08/msg00048.html"}],"affected":[{"package":{"name":"ncurses","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/ncurses?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.9-21.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0001.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}