Debian Package Tracker
Register | Log in
Subscribe

ncurses

Choose email to subscribe with

general
  • source: ncurses (main)
  • version: 6.5+20250216-2
  • maintainer: Ncurses Maintainers (DMD)
  • uploaders: Sven Joachim [DMD] [DM] – Craig Small [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 6.2+20201114-2+deb11u2
  • oldstable: 6.4-4
  • stable: 6.5+20250216-2
  • testing: 6.5+20250216-2
  • unstable: 6.5+20250216-2
versioned links
  • 6.2+20201114-2+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.4-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.5+20250216-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • lib32ncurses-dev
  • lib32ncurses6
  • lib32ncursesw6
  • lib32tinfo6
  • lib64ncurses-dev
  • lib64ncurses6
  • lib64ncursesw6
  • lib64tinfo6
  • libncurses-dev (1 bugs: 0, 0, 1, 0)
  • libncurses6
  • libncursesw6
  • libncursesw6-udeb
  • libtinfo6 (1 bugs: 0, 1, 0, 0)
  • libtinfo6-udeb
  • ncurses-base (8 bugs: 0, 2, 6, 0)
  • ncurses-bin (6 bugs: 0, 1, 5, 0)
  • ncurses-doc (5 bugs: 0, 1, 4, 0)
  • ncurses-examples
  • ncurses-term (2 bugs: 0, 1, 1, 0)
action needed
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2025-6141: A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.
Created: 2025-06-17 Last update: 2025-08-13 17:04
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2025-6141: A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.
Created: 2025-08-09 Last update: 2025-08-13 17:04
8 bugs tagged patch in the BTS normal
The BTS contains patches fixing 8 bugs (9 if counting merged bugs), consider including or untagging them.
Created: 2025-01-06 Last update: 2025-09-06 17:31
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2025-6141: (needs triaging) A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-06-17 Last update: 2025-08-13 17:04
2 low-priority security issues in bookworm low

There are 2 open security issues in bookworm.

2 issues left for the package maintainer to handle:
  • CVE-2025-6141: (needs triaging) A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.
  • CVE-2023-50495: (needs triaging) NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-12-12 Last update: 2025-08-13 17:04
news
[rss feed]
  • [2025-03-13] ncurses 6.5+20250216-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-06] Accepted ncurses 6.5+20250216-2 (source) into unstable (Sven Joachim)
  • [2025-02-24] ncurses 6.5+20250216-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-18] Accepted ncurses 6.5+20250216-1 (source) into unstable (Sven Joachim)
  • [2025-02-10] ncurses 6.5+20250125-2 MIGRATED to testing (Debian testing watch)
  • [2025-01-31] Accepted ncurses 6.5+20250125-2 (source) into unstable (Sven Joachim)
  • [2025-01-29] Accepted ncurses 6.5+20250125-1 (source) into experimental (Sven Joachim)
  • [2024-05-16] ncurses 6.5-2 MIGRATED to testing (Debian testing watch)
  • [2024-05-09] Accepted ncurses 6.5-2 (source) into unstable (Sven Joachim)
  • [2024-05-05] Accepted ncurses 6.5-1 (source) into experimental (Sven Joachim)
  • [2024-04-22] ncurses 6.4+20240414-1 MIGRATED to testing (Debian testing watch)
  • [2024-04-16] Accepted ncurses 6.4+20240414-1 (source) into unstable (Sven Joachim)
  • [2024-01-22] ncurses 6.4+20240113-1 MIGRATED to testing (Debian testing watch)
  • [2024-01-22] ncurses 6.4+20240113-1 MIGRATED to testing (Debian testing watch)
  • [2024-01-15] Accepted ncurses 6.4+20240113-1 (source) into unstable (Sven Joachim)
  • [2023-12-17] ncurses 6.4+20231209-1 MIGRATED to testing (Debian testing watch)
  • [2023-12-11] Accepted ncurses 6.4+20231209-1 (source) into unstable (Sven Joachim)
  • [2023-12-03] Accepted ncurses 6.1+20181013-2+deb10u5 (source) into oldoldstable (Guilhem Moulin)
  • [2023-11-28] ncurses 6.4+20231121-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-22] Accepted ncurses 6.4+20231121-1 (source) into unstable (Sven Joachim)
  • [2023-11-20] Accepted ncurses 6.4+20231118-1 (source) into unstable (Sven Joachim)
  • [2023-10-23] ncurses 6.4+20231016-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-17] Accepted ncurses 6.4+20231016-1 (source) into unstable (Sven Joachim)
  • [2023-10-12] Accepted ncurses 6.4+20231007-1 (source) into unstable (Sven Joachim)
  • [2023-09-28] Accepted ncurses 6.1+20181013-2+deb10u4 (source) into oldoldstable (Sean Whitton)
  • [2023-07-29] ncurses 6.4+20230625-2 MIGRATED to testing (Debian testing watch)
  • [2023-07-25] Accepted ncurses 6.2+20201114-2+deb11u2 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Sven Joachim)
  • [2023-07-23] Accepted ncurses 6.4+20230625-2 (source) into unstable (Sven Joachim)
  • [2023-07-11] ncurses 6.4+20230625-1 MIGRATED to testing (Debian testing watch)
  • [2023-07-01] Accepted ncurses 6.4+20230625-1 (source) into unstable (Sven Joachim)
  • 1
  • 2
bugs [bug history graph]
  • all: 37 38
  • RC: 0
  • I&N: 14
  • M&W: 23 24
  • F&P: 0
  • patch: 8 9
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 6.5+20250216-2
  • 29 bugs (1 patch)

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing