Your message dated Mon, 22 Sep 2025 17:46:25 +0000 with message-id <E1v0kcL-00FNYC-35@fasolo.debian.org> and subject line Bug#1110769: fixed in xterm 402-1 has caused the Debian Bug report #1110769, regarding xterm: segfault in ScrnWriteText with reverseWrap set to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1110769: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110769 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: xterm: segfault in ScrnWriteText on 3-byte binary data
- From: Vincent Lefevre <vincent@vinc17.net>
- Date: Mon, 11 Aug 2025 01:09:26 +0200
- Message-id: <20250810230926.GA2173244@qaa.vinc17.org>
Package: xterm Version: 398-1 Severity: important Tags: security upstream X-Debbugs-Cc: Debian Security Team <team@security.debian.org> I've just noticed that it is very easy to make xterm crash with some binary data: /usr/bin/xterm -e 'printf "\x9a\x85\x08"; sleep 2' The backtrace: $ gdb /usr/bin/xterm core.2173502 [...] Core was generated by `/usr/bin/xterm -e printf\ \"\\x9a\\x85\\x08\"\;\ sleep\ 2'. Program terminated with signal SIGSEGV, Segmentation fault. #0 ScrnWriteText (xw=xw@entry=0x7f64cb324010, offset=offset@entry=0, length=length@entry=36, flags=flags@entry=393216, cur_fg_bg=...) at ../screen.c:925 warning: 925 ../screen.c: No such file or directory (gdb) bt #0 ScrnWriteText (xw=xw@entry=0x7f64cb324010, offset=offset@entry=0, length=length@entry=36, flags=flags@entry=393216, cur_fg_bg=...) at ../screen.c:925 #1 0x000055a713b46734 in WriteText (xw=xw@entry=0x7f64cb324010, offset=0, length=length@entry=36) at ../util.c:1201 #2 0x000055a713aeb157 in dotext (xw=xw@entry=0x7f64cb324010, charset=<optimized out>, buf=0x55a714df7d40, len=36) at ../charproc.c:7128 #3 0x000055a713af30af in doparsing (xw=xw@entry=0x7f64cb324010, c=99, sp=<optimized out>) at ../charproc.c:3376 #4 0x000055a713afbe54 in VTparse (xw=xw@entry=0x7f64cb324010) at ../charproc.c:6471 #5 0x000055a713afc0a9 in VTRun (xw=0x7f64cb324010) at ../charproc.c:9593 #6 0x000055a713adbb0a in main (argc=<optimized out>, argv=<optimized out>) at ../main.c:3113 An attacker could make an xterm crash by providing such a sequence in a text file. It is generally a bad idea to can untrusted and unfiltered data to a terminal, but here, the sequence is so simple that it could pass trough. Or it could be a mistake, as I've just done (I forgot to remove "-o -" from arguments); this was on several hundreds of KB of binary data, and I could reduce the testcase to just 3 bytes. -- System Information: Debian Release: 13.0 APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'testing-security'), (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'proposed-updates-debug'), (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 6.7.12-amd64 (SMP w/16 CPU threads; PREEMPT) Kernel taint flags: TAINT_WARN Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages xterm depends on: ii libc6 2.41-12 ii libfontconfig1 2.15.0-2.3 ii libfreetype6 2.13.3+dfsg-1 ii libice6 2:1.1.1-1 ii libtinfo6 6.5+20250216-2 ii libutempter0 1.2.1-4 ii libx11-6 2:1.8.12-1 ii libxaw7 2:1.0.16-1 ii libxext6 2:1.3.4-1+b3 ii libxft2 2.3.6-1+b4 ii libxinerama1 2:1.1.4-3+b4 ii libxmu6 2:1.1.3-3+b4 ii libxpm4 1:3.5.17-1+b3 ii libxt6t64 1:1.2.1-1.2+b2 ii xbitmaps 1.1.1-2.2 Versions of packages xterm recommends: ii luit [luit] 2.0.20240910-1 ii x11-utils 7.7+7 Versions of packages xterm suggests: pn xfonts-cyrillic <none> -- no debconf information -- Vincent Lefèvre <vincent@vinc17.net> - Web: <https://www.vinc17.net/> 100% accessible validated (X)HTML - Blog: <https://www.vinc17.net/blog/> Work: CR INRIA - computer arithmetic / Pascaline project (LIP, ENS-Lyon)
--- End Message ---
--- Begin Message ---
- To: 1110769-close@bugs.debian.org
- Subject: Bug#1110769: fixed in xterm 402-1
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Mon, 22 Sep 2025 17:46:25 +0000
- Message-id: <E1v0kcL-00FNYC-35@fasolo.debian.org>
- Reply-to: Sven Joachim <svenjoac@gmx.de>
Source: xterm Source-Version: 402-1 Done: Sven Joachim <svenjoac@gmx.de> We believe that the bug you reported is fixed in the latest version of xterm, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1110769@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Sven Joachim <svenjoac@gmx.de> (supplier of updated xterm package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 22 Sep 2025 19:07:08 +0200 Source: xterm Architecture: source Version: 402-1 Distribution: unstable Urgency: medium Maintainer: Debian X Strike Force <debian-x@lists.debian.org> Changed-By: Sven Joachim <svenjoac@gmx.de> Closes: 1110769 Changes: xterm (402-1) unstable; urgency=medium . * New upstream release. - Add a null-pointer check in ScrnWriteText (Closes: #1110769). * Refresh Debian patches. * Update copy of XTerm FAQ to revision 1.432 (dated 2025/04/07). Checksums-Sha1: e3705db7100ddda3074c265bb4a87c3d5b7f2c22 2397 xterm_402-1.dsc 924b81086e83dcd1ab8d9205b139ecda9546fd0f 1612990 xterm_402.orig.tar.gz b4bb8d69057b633d556d9d2c3aa72573cc2db8a3 729 xterm_402.orig.tar.gz.asc dd30be0f24638270e0e94f05c52055d08522b991 125496 xterm_402-1.debian.tar.xz 937a0e8617256f44d34b312d8f0221bbf0ee1bfe 7614 xterm_402-1_source.buildinfo Checksums-Sha256: b73c4fe890cf4b4c0fa25f79c0748b0e71b3650d750894a150aee15b62712958 2397 xterm_402-1.dsc 5260c5793cd564c69e53ef6f528c00af066ae67b42d02137fb7ef8fafe70bb7a 1612990 xterm_402.orig.tar.gz ca977af99197342d54a6f6a03f7632a952d9ed3216a0e55e41506f219ebebb1a 729 xterm_402.orig.tar.gz.asc 44ba648522ddc8ab162a2c6c069478f0f628f0c181f7dc1d41044851982daf22 125496 xterm_402-1.debian.tar.xz 239954b857ab5aaad6d299599e4ea624dc6f7db1746252b0f773e9e22d9329da 7614 xterm_402-1_source.buildinfo Files: 6e42701629225921542c81e67aa5d431 2397 x11 optional xterm_402-1.dsc 9df3b113016c008c9ba01f7b808ca8a9 1612990 x11 optional xterm_402.orig.tar.gz 421cfa42b3a52fe1b2be233cd9e355bd 729 x11 optional xterm_402.orig.tar.gz.asc 2ffef4c176d6c63c33dcccabf48eed1e 125496 x11 optional xterm_402-1.debian.tar.xz 06814d008972fe9e1f2368d9348b007e 7614 x11 optional xterm_402-1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEKF8heKgv5Jai5p4QOxBucY1rMawFAmjRgqAACgkQOxBucY1r MayG8g/+OW5hq2e707LwU4L9r8KDIzq+dZ5AnwZMq8AK+eIifzZZkQhgCDHPyFfs SEai3J8RnVoSwXi6GQhSs7qSstuUrGmYI0EeWlJPyHWVPzsZUpixmyabVTae1XLy QSwHSxvg/FTJOoCAZdNrCTngdfJb5pUAD7oEPch0vjaYTiZrS3Sd3sp/gVdOdZdt aN4lYCR7OAt/pKJ1GnACD2X0XlhJbLEzicWmqtM5WL3GqbQpMKrLzkjTr56ZrgJs yL4dE3/5CSe9oeXkhBG6dqViQ48lIpKA/ONtOKXrP89ulTeKnssSsWjtW/gjTQA1 jgYbLjc48vV3biJFa0F7zPvcXESHrrzDLTWIFmV7C62UUon29ETR76o8x8gQO9U3 fnriOCFsk83CW4MiXsFMaHQU/XdTChDEdZqT8w7jvUhDG61qtnzwl4JF3LVEh9xQ Al0344dRFjW88LjJQNumay+AYR/wgvjVJbgtDjbP0ABm8nVcX69R9/2yiUa630gF kvTOHOocOUAOHpDQrfiPMKLEuanEeSTUntghblE3UyTJG7NSFPHSJ5Kv02Y6ZM17 Ev7viNFxS2LAuKRGw1vNsPUIkqbCmn9YzWFXrWYd4K+3ZxMj03Ak0bD9tYb2pdjL q9S3QdQrmbDf70sE4OlyYXWyKAvL+T7JYJLVKVqB7lnIhLSDwCI= =pwMk -----END PGP SIGNATURE-----Attachment: pgpTv9aI3U7s9.pgp
Description: PGP signature
--- End Message ---