Back to bug 2048676
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2022-01-31 17:18:45 UTC | Depends On | 2048677 | |
| Pedro Sampaio | 2022-01-31 17:18:46 UTC | Blocks | 2048678 | |
| Nick Black | 2022-02-01 15:18:06 UTC | CC | dank | |
| TEJ RATHI | 2022-02-04 12:35:45 UTC | Doc Text | A buffer-overflow vulnerability was found in xterms' set_sixel() function in 'graphics_sixel.c' file. When sixel-graphics functionality is enabled, it allows an attacker to trigger a buffer overflow via crafted text. This causes xterm to crash, affecting the availability of an application and leading to a denial of service. | |
| TEJ RATHI | 2022-02-04 12:39:06 UTC | Depends On | 2050673 | |
| RaTasha Tillery-Smith | 2022-02-04 15:34:43 UTC | Doc Text | A buffer-overflow vulnerability was found in xterms' set_sixel() function in 'graphics_sixel.c' file. When sixel-graphics functionality is enabled, it allows an attacker to trigger a buffer overflow via crafted text. This causes xterm to crash, affecting the availability of an application and leading to a denial of service. | A buffer-overflow vulnerability was found in xterm's set_sixel() function in the 'graphics_sixel.c' file. This flaw allows an attacker to trigger a buffer overflow via crafted text when the sixel-graphics functionality is enabled. This issue causes xterm to crash, affecting the availability of an application, leading to a denial of service. |
| Stoyan Nikolov | 2022-02-08 07:15:37 UTC | CC | michal.skrivanek, mperina, sbonazzo | |
| Red Hat Bugzilla | 2023-07-07 08:28:13 UTC | Assignee | security-response-team | nobody |
Back to bug 2048676