An memory exhaustion flaw was found in the way VTE, a terminal emulator widget, processed certain character sequences. A remote attacker could provide a specially-crafted file, which once opened in a terminal using the VTE terminal emulator could lead to excessive memory and CPU consumption. References: [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629688 [2] https://bugzilla.gnome.org/show_bug.cgi?id=652124
This issue affects the versions of the vte package, as shipped with Red Hat Enterprise Linux 4, 5, and 6. -- This issue affects the versions of the vte package, as shipped with Fedora release of 13, 14, and 15. Please schedule an update (once final upstream patch known).
Created vte tracking bugs for this issue Affects: fedora-all [bug 712150]
CVE Request: [3] http://www.openwall.com/lists/oss-security/2011/06/09/3
Public PoC how to reproduce the issu (from [1]): ================================================ $ printf "\033[100000000000000000@" > /tmp/x $ cat /tmp/x
Created attachment 503935 [details] Local copy of the preliminary patch, proposed by the issue reporter From [4] https://bugzilla.gnome.org/show_bug.cgi?id=652124#c4
This was assigned CVE-2011-2198.
Statement: (none)