Stack Buffer Overflow in GNU ncurses 6.5-20250322 tinfo/parse_entry.c
CVE-2025-6141 Published on June 16, 2025
GNU ncurses parse_entry.c postprocess_termcap stack-based overflow
A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.
Timeline
Advisory disclosed
VulDB entry created
VulDB entry last update
Weakness Types
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2025-6141 has been classified to as a Stack Overflow vulnerability or weakness.
What is a Buffer Overflow Vulnerability?
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CVE-2025-6141 has been classified to as a Buffer Overflow vulnerability or weakness.
Products Associated with CVE-2025-6141
Want to know whenever a new CVE is published for GNU Ncurses? stack.watch will email you.
Affected Versions
GNU ncurses:- Version 6.5-20250322 is affected.
- Version 6.5-20250329 is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.