<Vulnerability name="CVE-2025-69720">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2026-03-19T00:00:00</PublicDate>
    <Bugzilla id="2449037" url="https://bugzilla.redhat.com/show_bug.cgi?id=2449037" xml:lang="en:us">
ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.
    </Bugzilla>
    <CVSS3 status="verified">
        <CVSS3BaseScore>7.8</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-120</CWE>
    <Details xml:lang="en:us" source="Mitre">
The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.
    </Details>
    <Details xml:lang="en:us" source="Red Hat">
A flaw was found in ncurses. This vulnerability, a buffer overflow, exists within the `analyze_string()` function. An attacker could potentially exploit this to execute unauthorized code on the affected system, which might lead to a denial of service in the affected application, the corruption of data, or sensitive information being revealed to an attacker.
    </Details>
    <Statement xml:lang="en:us">
This Moderate impact vulnerability in ncurses affects Red Hat Enterprise Linux 10.0.z and 10.1.z. A buffer overflow in the `analyze_string()` function, exploitable through the `infocmp` utility, could lead to arbitrary code execution. Red Hat Enterprise Linux 6-ELS, 7-ELS, 8.x, 9.x, and OpenShift Container Platform are not affected as the vulnerable code is not present in these versions. Exploitation of this vulnerability requires that an affected application processes malicious data; this requires either user interaction or privileges on an affected system.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:10.1">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <ReleaseDate>2026-03-26T00:00:00Z</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2026:5913">RHSA-2026:5913</Advisory>
        <Package name="ncurses">ncurses-0:6.4-15.20240127.el10_1</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ncurses</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ncurses</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ncurses</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ncurses</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:openshift:4">
        <ProductName>Red Hat OpenShift Container Platform 4</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>rhcos</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2025-69720
https://nvd.nist.gov/vuln/detail/CVE-2025-69720
https://github.com/Cao-Wuhui/CVE-2025-69720
https://marc.info/?l=ncurses-bug&amp;m=176539968328570&amp;w=2
https://marc.info/?l=ncurses-bug&amp;m=176540731801330&amp;w=2
https://marc.info/?l=ncurses-bug&amp;m=176545557728083&amp;w=2
    </References>
</Vulnerability>