Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 832409 (CVE-2022-24130) - <x11-terms/xterm-371: buffer overflow in sixel support
Summary: <x11-terms/xterm-371: buffer overflow in sixel support
Status: RESOLVED FIXED
Alias: CVE-2022-24130
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [glsa+]
Keywords:
Depends on: 834975
Blocks:
  Show dependency tree
 
Reported: 2022-01-31 02:53 UTC by Sam James
Modified: 2022-08-14 00:14 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2022-01-31 02:53:44 UTC
From https://marc.info/?l=oss-security&m=164356795205932&w=2:
"howdy! in the hopes of further distributing my computing into
your terminal emulators, i this morning learned that i can
control writes to memory from XTerm's context via the method of
crafted sixel. en garde, i'll let you try my wu-tang style.

this was discovered while working on Notcurses bug #2573:

https://github.com/dankamongmen/notcurses/issues/2573

an error of mine own led to emission of a corrupted sixel [0], and
spectacular gyrations from XTerm:
[...]


This requires that XTerm was built with Sixel support, and that
the XTerm configuration interprets Sixels."
Comment 1 Larry the Git Cow gentoo-dev 2022-02-26 03:44:01 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7eb0cef3bd3a37c45312df02c1ba696709c8e2eb

commit 7eb0cef3bd3a37c45312df02c1ba696709c8e2eb
Author:     Sam James <sam@gentoo.org>
AuthorDate: 2022-02-26 03:34:58 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2022-02-26 03:43:28 +0000

    x11-terms/xterm: add 371
    
    Bug: https://bugs.gentoo.org/832409
    Signed-off-by: Sam James <sam@gentoo.org>

 x11-terms/xterm/Manifest         |  1 +
 x11-terms/xterm/xterm-371.ebuild | 98 ++++++++++++++++++++++++++++++++++++++++
 2 files changed, 99 insertions(+)
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-16 22:55:20 UTC
Please cleanup
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-10 16:02:13 UTC
Request filed
Comment 4 Larry the Git Cow gentoo-dev 2022-08-14 00:12:01 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=60298a368732a5fdf5e926ec4c59811f482e73b5

commit 60298a368732a5fdf5e926ec4c59811f482e73b5
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2022-08-14 00:10:06 +0000
Commit:     John Helmert III <ajak@gentoo.org>
CommitDate: 2022-08-14 00:11:46 +0000

    [ GLSA 202208-22 ] xterm: Multiple Vulnerabilities
    
    Bug: https://bugs.gentoo.org/769839
    Bug: https://bugs.gentoo.org/832409
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: John Helmert III <ajak@gentoo.org>

 glsa-202208-22.xml | 44 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 44 insertions(+)
Comment 5 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-14 00:14:58 UTC
GLSA released, all done!