Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:5913 - Security Advisory
Issued:
2026-03-26
Updated:
2026-03-26

RHSA-2026:5913 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: ncurses security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for ncurses is now available for Red Hat Enterprise Linux 10.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.

Security Fix(es):

  • ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution. (CVE-2025-69720)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 10 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 10 s390x
  • Red Hat Enterprise Linux for Power, little endian 10 ppc64le
  • Red Hat Enterprise Linux for ARM 64 10 aarch64

Fixes

  • BZ - 2449037 - CVE-2025-69720 ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.

CVEs

  • CVE-2025-69720

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 10

SRPM
ncurses-6.4-15.20240127.el10_1.src.rpm SHA-256: f31cd79c6f005f85f0fdbdac5025c1ccc2b2b9c88103fd8ca94fc523c8c4c6ec
x86_64
ncurses-6.4-15.20240127.el10_1.x86_64.rpm SHA-256: 420a86b376c70f56cd06f8cea4614b7c4287223a4602b2d6e46e54cd7778e398
ncurses-base-6.4-15.20240127.el10_1.noarch.rpm SHA-256: bfd174abe13d38f5515ef5d960d2cf57ef5c09b21a8a7ff589f6c6c6fd6d6fe6
ncurses-c++-libs-6.4-15.20240127.el10_1.x86_64.rpm SHA-256: 4cc6399ddd55664b59d770a6b3116b21294aa6675eba48615269a17f93674171
ncurses-c++-libs-debuginfo-6.4-15.20240127.el10_1.x86_64.rpm SHA-256: c624f276a119ece2153836c193a4b6f6bdb2c408f1073b0bc9ebfb677e111b2c
ncurses-c++-libs-debuginfo-6.4-15.20240127.el10_1.x86_64.rpm SHA-256: c624f276a119ece2153836c193a4b6f6bdb2c408f1073b0bc9ebfb677e111b2c
ncurses-debuginfo-6.4-15.20240127.el10_1.x86_64.rpm SHA-256: 9fc3c73e1d6bc33259b47b1e298312a45c333b679848baa321cfca1fbc1a788d
ncurses-debuginfo-6.4-15.20240127.el10_1.x86_64.rpm SHA-256: 9fc3c73e1d6bc33259b47b1e298312a45c333b679848baa321cfca1fbc1a788d
ncurses-debugsource-6.4-15.20240127.el10_1.x86_64.rpm SHA-256: 4850f9780ba179a8944209cb1baefed26c5681c192a00d7d1d3cee6133094e23
ncurses-debugsource-6.4-15.20240127.el10_1.x86_64.rpm SHA-256: 4850f9780ba179a8944209cb1baefed26c5681c192a00d7d1d3cee6133094e23
ncurses-devel-6.4-15.20240127.el10_1.x86_64.rpm SHA-256: 3d6c68c2a9f6e74d31dd1e0c261ba0d235c29296b268a17fc5e89c7b44b1e25a
ncurses-libs-6.4-15.20240127.el10_1.x86_64.rpm SHA-256: a028e489c8b94812269f950affa4cca905658e31eca16f37d32f60cc26783762
ncurses-libs-debuginfo-6.4-15.20240127.el10_1.x86_64.rpm SHA-256: fdad9e998e8685717d8c01fa669029a5134dae047868845291b8ac4126ec5fca
ncurses-libs-debuginfo-6.4-15.20240127.el10_1.x86_64.rpm SHA-256: fdad9e998e8685717d8c01fa669029a5134dae047868845291b8ac4126ec5fca
ncurses-term-6.4-15.20240127.el10_1.noarch.rpm SHA-256: 43e2058cc07f5ea1b4e1c12646a51f1f798b432b16bdd48155a529cc5ea7aa6f

Red Hat Enterprise Linux for IBM z Systems 10

SRPM
ncurses-6.4-15.20240127.el10_1.src.rpm SHA-256: f31cd79c6f005f85f0fdbdac5025c1ccc2b2b9c88103fd8ca94fc523c8c4c6ec
s390x
ncurses-6.4-15.20240127.el10_1.s390x.rpm SHA-256: 2eb64d0d4d5d653e99bf1cbeba4268713c52b176496882b31086ad9e016016b6
ncurses-base-6.4-15.20240127.el10_1.noarch.rpm SHA-256: bfd174abe13d38f5515ef5d960d2cf57ef5c09b21a8a7ff589f6c6c6fd6d6fe6
ncurses-c++-libs-6.4-15.20240127.el10_1.s390x.rpm SHA-256: f03c36393561e93cda1e7a72a021d4d99a17cd75c8ab6d986f3c9f5607471532
ncurses-c++-libs-debuginfo-6.4-15.20240127.el10_1.s390x.rpm SHA-256: 50cebda2acbbd7db4111f03123f424cb2c6e14dfc9559da8e69c8ffa6cecc8f9
ncurses-c++-libs-debuginfo-6.4-15.20240127.el10_1.s390x.rpm SHA-256: 50cebda2acbbd7db4111f03123f424cb2c6e14dfc9559da8e69c8ffa6cecc8f9
ncurses-debuginfo-6.4-15.20240127.el10_1.s390x.rpm SHA-256: 6c1c4792117caaa7004646e4ceafc47a8ac4944395026c06e559ecec0ab8b40a
ncurses-debuginfo-6.4-15.20240127.el10_1.s390x.rpm SHA-256: 6c1c4792117caaa7004646e4ceafc47a8ac4944395026c06e559ecec0ab8b40a
ncurses-debugsource-6.4-15.20240127.el10_1.s390x.rpm SHA-256: 0668dfa67461039b0f086d447e144d69e67a5770cbf0d8f99d63fd4126fb2ee5
ncurses-debugsource-6.4-15.20240127.el10_1.s390x.rpm SHA-256: 0668dfa67461039b0f086d447e144d69e67a5770cbf0d8f99d63fd4126fb2ee5
ncurses-devel-6.4-15.20240127.el10_1.s390x.rpm SHA-256: c20ebc846b159ae99488f2d6813d21e916ff993d8bc9a987c27b138f5e569085
ncurses-libs-6.4-15.20240127.el10_1.s390x.rpm SHA-256: faa7533617caa233cbcf0199e12a32a598ba71fab3464dd5fa5725c51cbb501c
ncurses-libs-debuginfo-6.4-15.20240127.el10_1.s390x.rpm SHA-256: cad2ba389f18dc133907c110a2f598f1c2ea4b6dc066760c16f7d5ec05c2a85a
ncurses-libs-debuginfo-6.4-15.20240127.el10_1.s390x.rpm SHA-256: cad2ba389f18dc133907c110a2f598f1c2ea4b6dc066760c16f7d5ec05c2a85a
ncurses-term-6.4-15.20240127.el10_1.noarch.rpm SHA-256: 43e2058cc07f5ea1b4e1c12646a51f1f798b432b16bdd48155a529cc5ea7aa6f

Red Hat Enterprise Linux for Power, little endian 10

SRPM
ncurses-6.4-15.20240127.el10_1.src.rpm SHA-256: f31cd79c6f005f85f0fdbdac5025c1ccc2b2b9c88103fd8ca94fc523c8c4c6ec
ppc64le
ncurses-6.4-15.20240127.el10_1.ppc64le.rpm SHA-256: fd742402a2377208ed5c942aef3bfe9a84207fe7c0b690649bcbcca7ff7d7d19
ncurses-base-6.4-15.20240127.el10_1.noarch.rpm SHA-256: bfd174abe13d38f5515ef5d960d2cf57ef5c09b21a8a7ff589f6c6c6fd6d6fe6
ncurses-c++-libs-6.4-15.20240127.el10_1.ppc64le.rpm SHA-256: 30c2eee2b5c87f89e083ac50f5b00d1c23a973d72a8d4a850073242cd93e4caf
ncurses-c++-libs-debuginfo-6.4-15.20240127.el10_1.ppc64le.rpm SHA-256: a82c03d2e1c75d7ee48b8b93edd625d93b3379211d7a9a60371a2da0029ed41d
ncurses-c++-libs-debuginfo-6.4-15.20240127.el10_1.ppc64le.rpm SHA-256: a82c03d2e1c75d7ee48b8b93edd625d93b3379211d7a9a60371a2da0029ed41d
ncurses-debuginfo-6.4-15.20240127.el10_1.ppc64le.rpm SHA-256: fa4a3a92e3bf9ecf62da0e635bbf0ce3e92af296dbc9f71fa06002f85d762263
ncurses-debuginfo-6.4-15.20240127.el10_1.ppc64le.rpm SHA-256: fa4a3a92e3bf9ecf62da0e635bbf0ce3e92af296dbc9f71fa06002f85d762263
ncurses-debugsource-6.4-15.20240127.el10_1.ppc64le.rpm SHA-256: 290db0ef78f74105b61491bea5bb4b084d545aed9b9ab90eb158dd9ac2a86e02
ncurses-debugsource-6.4-15.20240127.el10_1.ppc64le.rpm SHA-256: 290db0ef78f74105b61491bea5bb4b084d545aed9b9ab90eb158dd9ac2a86e02
ncurses-devel-6.4-15.20240127.el10_1.ppc64le.rpm SHA-256: 025513a5b93edbf766381007303d8cb1b0fc59d338141c92e8918e326903a187
ncurses-libs-6.4-15.20240127.el10_1.ppc64le.rpm SHA-256: 1542ef3f7607b0b64469be6c0ac4c6ec3982a20516501fe230c123c0540ad3a9
ncurses-libs-debuginfo-6.4-15.20240127.el10_1.ppc64le.rpm SHA-256: 0e81a7a19e90493de5be514919cc95b51f1968fea807d28904ae6d72f5cd5750
ncurses-libs-debuginfo-6.4-15.20240127.el10_1.ppc64le.rpm SHA-256: 0e81a7a19e90493de5be514919cc95b51f1968fea807d28904ae6d72f5cd5750
ncurses-term-6.4-15.20240127.el10_1.noarch.rpm SHA-256: 43e2058cc07f5ea1b4e1c12646a51f1f798b432b16bdd48155a529cc5ea7aa6f

Red Hat Enterprise Linux for ARM 64 10

SRPM
ncurses-6.4-15.20240127.el10_1.src.rpm SHA-256: f31cd79c6f005f85f0fdbdac5025c1ccc2b2b9c88103fd8ca94fc523c8c4c6ec
aarch64
ncurses-6.4-15.20240127.el10_1.aarch64.rpm SHA-256: fd6df1d2d26359e5cffe89bcbaca398a246b93fe56c6889e94586af46de48f55
ncurses-base-6.4-15.20240127.el10_1.noarch.rpm SHA-256: bfd174abe13d38f5515ef5d960d2cf57ef5c09b21a8a7ff589f6c6c6fd6d6fe6
ncurses-c++-libs-6.4-15.20240127.el10_1.aarch64.rpm SHA-256: dd44c9b1f85276f4efcfcc77b82774db0a97762825f2b6ed3fe4e8a30ef40c86
ncurses-c++-libs-debuginfo-6.4-15.20240127.el10_1.aarch64.rpm SHA-256: 092d38adab051e179c5f61fabedcad0f60f9708e505b1f1b705ec3c9b5b09e69
ncurses-c++-libs-debuginfo-6.4-15.20240127.el10_1.aarch64.rpm SHA-256: 092d38adab051e179c5f61fabedcad0f60f9708e505b1f1b705ec3c9b5b09e69
ncurses-debuginfo-6.4-15.20240127.el10_1.aarch64.rpm SHA-256: e06555f19f73dabd56535451dbad06e4a2bc47482749efef003c106dfdaf871d
ncurses-debuginfo-6.4-15.20240127.el10_1.aarch64.rpm SHA-256: e06555f19f73dabd56535451dbad06e4a2bc47482749efef003c106dfdaf871d
ncurses-debugsource-6.4-15.20240127.el10_1.aarch64.rpm SHA-256: 476ddcc9aff969ceb21dea4318dc9a1255b13b6138a36e0946299339c2803732
ncurses-debugsource-6.4-15.20240127.el10_1.aarch64.rpm SHA-256: 476ddcc9aff969ceb21dea4318dc9a1255b13b6138a36e0946299339c2803732
ncurses-devel-6.4-15.20240127.el10_1.aarch64.rpm SHA-256: dfe2cebfac64fdf447e2cde8e49ba60fe1b5fd2610a1c5d8f758dc45b288ec31
ncurses-libs-6.4-15.20240127.el10_1.aarch64.rpm SHA-256: 8fb50a60f1d1cf382f0b3857bf15e23b767c85e93b879dc391fb55aa38fe9a47
ncurses-libs-debuginfo-6.4-15.20240127.el10_1.aarch64.rpm SHA-256: e4f1ce33007de6eb111ac4c23d1f14008bf67b84fed884ec3f706e3fc96fb1b3
ncurses-libs-debuginfo-6.4-15.20240127.el10_1.aarch64.rpm SHA-256: e4f1ce33007de6eb111ac4c23d1f14008bf67b84fed884ec3f706e3fc96fb1b3
ncurses-term-6.4-15.20240127.el10_1.noarch.rpm SHA-256: 43e2058cc07f5ea1b4e1c12646a51f1f798b432b16bdd48155a529cc5ea7aa6f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility