xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text. References: https://invisible-island.net/xterm/xterm.log.html https://www.openwall.com/lists/oss-security/2022/01/30/2 https://www.openwall.com/lists/oss-security/2022/01/30/3 https://twitter.com/nickblack/status/1487731459398025216
Created xterm tracking bugs for this issue: Affects: fedora-all [bug 2048677]
Marking services-openshift-cluster-manager affected/delegated for presence of affected code found in the following containers: - https://quay.io/app-sre/selenium-standalone-chrome-debug:latest - https://quay.io/app-sre/selenium-standalone-firefox-debug:latest