rxvt: CVE-2017-7483

Related Vulnerabilities: CVE-2017-7483  

Debian Bug report logs - #861694
rxvt: CVE-2017-7483

version graph

Package: src:rxvt; Maintainer for src:rxvt is Ryan Kavanagh <rak@debian.org>;

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Tue, 2 May 2017 20:12:01 UTC

Severity: important

Tags: patch, security, upstream

Found in version rxvt/1:2.7.10-6

Fixed in version rxvt/1:2.7.10-7.1

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, George Gensure <werkt0@gmail.com>:
Bug#861694; Package src:rxvt. (Tue, 02 May 2017 20:12:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, George Gensure <werkt0@gmail.com>. (Tue, 02 May 2017 20:12:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: rxvt: CVE-2017-7483
Date: Tue, 02 May 2017 22:08:08 +0200
Source: rxvt
Version: 1:2.7.10-6
Severity: important
Tags: security upstream patch

Hi,

the following vulnerability was published for rxvt.

CVE-2017-7483[0]:
| Rxvt 2.7.10 is vulnerable to a denial of service attack by passing the
| value -2^31 inside a terminal escape code, which results in a
| non-invertible integer that eventually leads to a segfault due to an
| out of bounds read.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-7483
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7483
[1] http://www.openwall.com/lists/oss-security/2017/05/01/15
[2] http://www.openwall.com/lists/oss-security/2017/05/01/18

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, George Gensure <werkt0@gmail.com>:
Bug#861694; Package src:rxvt. (Sat, 30 Sep 2017 16:24:03 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Muehlenhoff <jmm@debian.org>:
Extra info received and forwarded to list. Copy sent to George Gensure <werkt0@gmail.com>. (Sat, 30 Sep 2017 16:24:03 GMT) (full text, mbox, link).


Message #10 received at 861694@bugs.debian.org (full text, mbox, reply):

From: Moritz Muehlenhoff <jmm@debian.org>
To: 861694@bugs.debian.org, werkt0@gmail.com
Cc: carnil@debian.org
Subject: Re: rxvt: CVE-2017-7483
Date: Sat, 30 Sep 2017 18:21:19 +0200
On Tue, May 02, 2017 at 10:08:08PM +0200, Salvatore Bonaccorso wrote:
> Source: rxvt
> Version: 1:2.7.10-6
> Severity: important
> Tags: security upstream patch
> 
> Hi,
> 
> the following vulnerability was published for rxvt.
> 
> CVE-2017-7483[0]:
> | Rxvt 2.7.10 is vulnerable to a denial of service attack by passing the
> | value -2^31 inside a terminal escape code, which results in a
> | non-invertible integer that eventually leads to a segfault due to an
> | out of bounds read.

What's the status? This is unfixed for several months now.

Cheers,
        Moritz



Information forwarded to debian-bugs-dist@lists.debian.org, George Gensure <werkt0@gmail.com>:
Bug#861694; Package src:rxvt. (Tue, 03 Oct 2017 19:15:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to George Gensure <werkt0@gmail.com>. (Tue, 03 Oct 2017 19:15:03 GMT) (full text, mbox, link).


Message #15 received at 861694@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 861694@bugs.debian.org
Subject: rxvt: diff for NMU version 1:2.7.10-7.1
Date: Tue, 3 Oct 2017 21:13:24 +0200
[Message part 1 (text/plain, inline)]
Control: tags 861694 + pending

Dear maintainer,

I've prepared an NMU for rxvt (versioned as 1:2.7.10-7.1) and
uploaded it to DELAYED/5. Please feel free to tell me if I
should delay it longer.

Regards,
Salvatore
[rxvt-2.7.10-7.1-nmu.diff (text/x-diff, attachment)]

Added tag(s) pending. Request was from Salvatore Bonaccorso <carnil@debian.org> to 861694-submit@bugs.debian.org. (Tue, 03 Oct 2017 19:15:03 GMT) (full text, mbox, link).


Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Sun, 08 Oct 2017 19:39:04 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 08 Oct 2017 19:39:04 GMT) (full text, mbox, link).


Message #22 received at 861694-close@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 861694-close@bugs.debian.org
Subject: Bug#861694: fixed in rxvt 1:2.7.10-7.1
Date: Sun, 08 Oct 2017 19:34:22 +0000
Source: rxvt
Source-Version: 1:2.7.10-7.1

We believe that the bug you reported is fixed in the latest version of
rxvt, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 861694@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated rxvt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 03 Oct 2017 21:07:20 +0200
Source: rxvt
Binary: rxvt rxvt-ml
Architecture: source
Version: 1:2.7.10-7.1
Distribution: unstable
Urgency: medium
Maintainer: George Gensure <werkt0@gmail.com>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 861694
Description: 
 rxvt       - VT102 terminal emulator for the X Window System
 rxvt-ml    - multi-lingual VT102 terminal emulator for the X Window System
Changes:
 rxvt (1:2.7.10-7.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * CVE-2017-7483: crash / code execution via escape sequence
     (Closes: #861694)
Checksums-Sha1: 
 424604539043cf9e616184b66dab74620a0d9165 1947 rxvt_2.7.10-7.1.dsc
 86e4c2e09b24f0c00850ef255f49cbc9d3b754b2 29956 rxvt_2.7.10-7.1.debian.tar.xz
Checksums-Sha256: 
 c6d9d3ddecc70009e19faec1a6191785bb604810fbb9599bb77b4cd7fb5ab6a5 1947 rxvt_2.7.10-7.1.dsc
 a4ed6252d9001fa0dfc0f9cd5e0619bfd37598bc91ad4cd1d96e5e3a55784d89 29956 rxvt_2.7.10-7.1.debian.tar.xz
Files: 
 f0d2a360804c758d4913e168e51377cf 1947 x11 optional rxvt_2.7.10-7.1.dsc
 86f8b88150e927bcd621d56b92908c48 29956 x11 optional rxvt_2.7.10-7.1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlnT4MFfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89EjE8QAIfq7UsgitUfvD4WD0GIQO3xFwnvpfk3
IERnXODTZYeVYMxlkCEFKzxitVzxUYwN/Pp+Rc4ZpXg7EIPOSbQjEXJnbFLeQRjm
/NZlrEbMJ5Oa5Ojp0E2wwMSLwaC5u83ZRKKKrZfTz3RBvhr6/IcaR2yzduUZGgcb
nG4ysv8/1ssjAXsblBM/gIERdq6psUCsHsUIY4sesUM38PCRs+KQQn2JYHRnG0eJ
YSpWlDrZNUJMabUkTREI2UESP8q9e9bDaIb/Gtr2GiAk6mC2Ed9dPxWgPnKzJGWm
+jZYs5NkgismuJhaNroIRsGWWC/Rxiyd4xS++1qRvtcLCfjTcGBe+s2gM2rFmdZP
wNX7SzTw3LuXSL3VauD8uiX09cTNu2FFJWWZXQju7PsLgahmm+z4g6hn8t6x/6os
YLdMYHm0/Bw0SCs4L0akOks7yBL0d226uYR9ra1B890BGVkau+3PSRcWBJAYjdIx
1ZikxqfSWcWWoT8B0djLnRIprzlWZaiRmD1JrvOVPtp313I0Y1c05i2UU29C4CzF
DIzNxW9VzI7+VDjt9WCaQVshTzxEOtWcJiGhtU4o7SiVC3We6cx6CM/wRoxrOrT0
PGg4R4kZHQWHShRmqxRpIrxlyBFO5f1vaGUlqArL8xtTKGBQ033WDJU4fZ1BXnrW
ZMAckEVa1aKu
=VZlx
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 11 Nov 2017 07:29:12 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:48:54 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.