Updated ncurses4 compatability packages which fix a potential security problem are available.
The ncurses library provides a terminal-independent method of screen handling. A problem has been found in ncurses version 5.0 that could cause a buffer overflow. This overflow could be locally exploited if the library is linked into a program that runs setuid or setgid. Red Hat Linux ships with a compatibility package 'ncurses4' that is actually based on ncurses version 5.0 but has been made ABI compatible with ncurses 4. No programs that ship with Red Hat Linux are exploitable. A program could only be exploited if it uses the ncurses 4 compatiblity package and if it is run setuid or setgid. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2002-0062 to this issue. Thanks to Daniel Jacobowitz at MontaVista Software for alerting us to this issue.