Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-24130

Опубликовано: 31 янв. 2022
Источник: debian

Описание

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xtermfixed370-2package
xtermfixed366-1+deb11u1bullseyepackage
xtermfixed344-1+deb10u2busterpackage

Примечания

  • https://twitter.com/nickblack/status/1487731459398025216

  • https://www.openwall.com/lists/oss-security/2022/01/30/2

  • https://www.openwall.com/lists/oss-security/2022/01/30/3

  • https://github.com/ThomasDickey/xterm-snapshots/commit/1584fc227673264661250d3a8d673c168ac9512d

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 4 года назад

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

CVSS3: 5.5
redhat
почти 4 года назад

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

CVSS3: 5.5
nvd
почти 4 года назад

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

CVSS3: 5.5
msrc
почти 4 года назад

xterm through Patch 370 when Sixel support is enabled allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

suse-cvrf
почти 3 года назад

Security update for xterm