CVE-2022-24130

NameCVE-2022-24130
Descriptionxterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2913-1
Debian Bugs1004689

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xterm (PTS)buster344-1+deb10u2fixed
bullseye366-1+deb11u1fixed
bookworm379-1fixed
sid, trixie390-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xtermsourcestretch327-2+deb9u2DLA-2913-1
xtermsourcebuster344-1+deb10u2
xtermsourcebullseye366-1+deb11u1
xtermsource(unstable)370-21004689

Notes

https://twitter.com/nickblack/status/1487731459398025216
https://www.openwall.com/lists/oss-security/2022/01/30/2
https://www.openwall.com/lists/oss-security/2022/01/30/3
https://github.com/ThomasDickey/xterm-snapshots/commit/1584fc227673264661250d3a8d673c168ac9512d

Search for package or bug name: Reporting problems