UBUNTU-CVE-2025-6141

Source
https://ubuntu.com/security/CVE-2025-6141
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-6141.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-6141
Upstream
Published
2025-06-16T22:16:00Z
Modified
2026-04-22T16:08:19.927561Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
  • 4.8 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocesstermcap of the file tinfo/parseentry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.

References

Affected packages

Ubuntu:20.04:LTS
ncurses

Package

Name
ncurses
Purl
pkg:deb/ubuntu/ncurses@6.2-0ubuntu2.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.1+20190803-1ubuntu1
6.1+20191019-1ubuntu1
6.2-0ubuntu2
6.2-0ubuntu2.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "lib32ncurses6"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "lib32ncursesw6"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "lib32tinfo6"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "lib64ncurses6"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "lib64ncursesw6"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "lib64tinfo6"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "libncurses5"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "libncurses6"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "libncursesw5"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "libncursesw6"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "libtinfo5"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "libtinfo6"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "ncurses-base"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "ncurses-bin"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "ncurses-examples"
        },
        {
            "binary_version": "6.2-0ubuntu2.1",
            "binary_name": "ncurses-term"
        }
    ],
    "priority_reason": "no security impact as terminfo files are trusted"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-6141.json"
Ubuntu:22.04:LTS
ncurses

Package

Name
ncurses
Purl
pkg:deb/ubuntu/ncurses@6.3-2ubuntu0.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.2+20201114-2build1
6.2+20201114-2build2
6.3-1
6.3-2
6.3-2ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "lib32ncurses6"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "lib32ncursesw6"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "lib32tinfo6"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "lib64ncurses6"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "lib64ncursesw6"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "lib64tinfo6"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "libncurses5"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "libncurses6"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "libncursesw5"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "libncursesw6"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "libtinfo5"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "libtinfo6"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "ncurses-base"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "ncurses-bin"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "ncurses-examples"
        },
        {
            "binary_version": "6.3-2ubuntu0.1",
            "binary_name": "ncurses-term"
        }
    ],
    "priority_reason": "no security impact as terminfo files are trusted"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-6141.json"
Ubuntu:24.04:LTS
ncurses

Package

Name
ncurses
Purl
pkg:deb/ubuntu/ncurses@6.4+20240113-1ubuntu2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.4+20230625-2
6.4+20231016-1
6.4+20231121-1build1
6.4+20231209-1
6.4+20240113-1ubuntu1
6.4+20240113-1ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "lib32ncurses6"
        },
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "lib32ncursesw6"
        },
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "lib32tinfo6"
        },
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "lib64ncurses6"
        },
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "lib64ncursesw6"
        },
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "lib64tinfo6"
        },
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "libncurses6"
        },
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "libncursesw6"
        },
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "libtinfo6"
        },
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "ncurses-base"
        },
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "ncurses-bin"
        },
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "ncurses-examples"
        },
        {
            "binary_version": "6.4+20240113-1ubuntu2",
            "binary_name": "ncurses-term"
        }
    ],
    "priority_reason": "no security impact as terminfo files are trusted"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-6141.json"
Ubuntu:25.10
ncurses

Package

Name
ncurses
Purl
pkg:deb/ubuntu/ncurses@6.5+20250216-2build1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.5+20250216-2
6.5+20250216-2build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "lib32ncurses6"
        },
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "lib32ncursesw6"
        },
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "lib32tinfo6"
        },
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "lib64ncurses6"
        },
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "lib64ncursesw6"
        },
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "lib64tinfo6"
        },
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "libncurses6"
        },
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "libncursesw6"
        },
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "libtinfo6"
        },
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "ncurses-base"
        },
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "ncurses-bin"
        },
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "ncurses-examples"
        },
        {
            "binary_version": "6.5+20250216-2build1",
            "binary_name": "ncurses-term"
        }
    ],
    "priority_reason": "no security impact as terminfo files are trusted"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-6141.json"
Ubuntu:Pro:14.04:LTS
ncurses

Package

Name
ncurses
Purl
pkg:deb/ubuntu/ncurses@5.9+20140118-1ubuntu1+esm5?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.9+20130608-1ubuntu1
5.9+20131221-1ubuntu1
5.9+20140118-1ubuntu1
5.9+20140118-1ubuntu1+esm1
5.9+20140118-1ubuntu1+esm2
5.9+20140118-1ubuntu1+esm3
5.9+20140118-1ubuntu1+esm4
5.9+20140118-1ubuntu1+esm5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "lib32ncurses5"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "lib32ncursesw5"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "lib32tinfo5"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "lib64ncurses5"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "lib64tinfo5"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "libncurses5"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "libncursesw5"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "libtinfo5"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "libx32ncurses5"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "libx32ncursesw5"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "libx32tinfo5"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "ncurses-base"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "ncurses-bin"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "ncurses-examples"
        },
        {
            "binary_version": "5.9+20140118-1ubuntu1+esm5",
            "binary_name": "ncurses-term"
        }
    ],
    "priority_reason": "no security impact as terminfo files are trusted"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-6141.json"
Ubuntu:Pro:16.04:LTS
ncurses

Package

Name
ncurses
Purl
pkg:deb/ubuntu/ncurses@6.0+20160213-1ubuntu1+esm5?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.9+20150516-2ubuntu1
6.*
6.0+20151024-2ubuntu1
6.0+20151024-2ubuntu2
6.0+20160213-1ubuntu1
6.0+20160213-1ubuntu1+esm1
6.0+20160213-1ubuntu1+esm2
6.0+20160213-1ubuntu1+esm3
6.0+20160213-1ubuntu1+esm4
6.0+20160213-1ubuntu1+esm5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "lib32ncurses5"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "lib32ncursesw5"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "lib32tinfo5"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "lib64ncurses5"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "lib64tinfo5"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "libncurses5"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "libncursesw5"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "libtinfo5"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "libx32ncurses5"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "libx32ncursesw5"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "libx32tinfo5"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "ncurses-base"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "ncurses-bin"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "ncurses-examples"
        },
        {
            "binary_version": "6.0+20160213-1ubuntu1+esm5",
            "binary_name": "ncurses-term"
        }
    ],
    "priority_reason": "no security impact as terminfo files are trusted"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-6141.json"
Ubuntu:Pro:18.04:LTS
ncurses

Package

Name
ncurses
Purl
pkg:deb/ubuntu/ncurses@6.1-1ubuntu1.18.04.1+esm2?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.0+20160625-1ubuntu1
6.0+20171125-1ubuntu1
6.1-1ubuntu1
6.1-1ubuntu1.18.04
6.1-1ubuntu1.18.04.1
6.1-1ubuntu1.18.04.1+esm1
6.1-1ubuntu1.18.04.1+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "lib32ncurses5"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "lib32ncursesw5"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "lib32tinfo5"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "lib64ncurses5"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "lib64tinfo5"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "libncurses5"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "libncursesw5"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "libtinfo5"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "libx32ncurses5"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "libx32ncursesw5"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "libx32tinfo5"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "ncurses-base"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "ncurses-bin"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "ncurses-examples"
        },
        {
            "binary_version": "6.1-1ubuntu1.18.04.1+esm2",
            "binary_name": "ncurses-term"
        }
    ],
    "priority_reason": "no security impact as terminfo files are trusted"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-6141.json"