Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-6141

Опубликовано: 16 июн. 2025
Источник: redhat
CVSS3: 3.3

Описание

No description is available for this CVE.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10ncursesNot affected
Red Hat Enterprise Linux 6ncursesNot affected
Red Hat Enterprise Linux 7ncursesNot affected
Red Hat Enterprise Linux 8ncursesNot affected
Red Hat Enterprise Linux 9ncursesNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-119
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2373097gnu-ncurses: ncurses Stack Buffer Overflow

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
nvd
2 дня назад

A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.

CVSS3: 3.3
debian
2 дня назад

A vulnerability has been found in GNU ncurses up to 6.5-20250322 and c ...

CVSS3: 3.3
github
2 дня назад

A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.

3.3 Low

CVSS3