Опубликовано: 31 янв. 2022
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 2.6
CVSS3: 5.5
Описание
xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | needs-triage | |
| esm-apps/bionic | needs-triage | |
| esm-apps/focal | needs-triage | |
| esm-apps/jammy | needs-triage | |
| esm-apps/noble | needs-triage | |
| esm-infra/xenial | needs-triage | |
| focal | ignored | end of standard support, was needs-triage |
| impish | ignored | end of life |
| jammy | needs-triage |
Показывать по
10
EPSS
Процентиль: 59%
0.00387
Низкий
2.6 Low
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
CVSS3: 5.5
redhat
около 4 лет назад
xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
CVSS3: 5.5
nvd
около 4 лет назад
xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
CVSS3: 5.5
debian
около 4 лет назад
xterm through Patch 370, when Sixel support is enabled, allows attacke ...
EPSS
Процентиль: 59%
0.00387
Низкий
2.6 Low
CVSS2
5.5 Medium
CVSS3