{"id":"USN-6833-1","summary":"vte2.91 vulnerability","details":"Siddharth Dushantha discovered that VTE incorrectly handled large window\nresize escape sequences. An attacker could possibly use this issue to\nconsume resources, leading to a denial of service.\n","modified":"2026-04-27T16:55:49.063722Z","published":"2024-06-13T12:35:18Z","related":["UBUNTU-CVE-2024-37535"],"upstream":["CVE-2024-37535","UBUNTU-CVE-2024-37535"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6833-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-37535"}],"affected":[{"package":{"name":"vte2.91","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/vte2.91@0.60.3-0ubuntu1~20.5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.60.3-0ubuntu1~20.5"}]}],"versions":["0.58.2-1ubuntu2","0.59.91-0ubuntu1","0.59.91-0ubuntu2","0.60.0-2ubuntu2","0.60.1-1ubuntu1","0.60.3-0ubuntu1~20.04"],"ecosystem_specific":{"binaries":[{"binary_version":"0.60.3-0ubuntu1~20.5","binary_name":"gir1.2-vte-2.91"},{"binary_version":"0.60.3-0ubuntu1~20.5","binary_name":"libvte-2.91-0"},{"binary_version":"0.60.3-0ubuntu1~20.5","binary_name":"libvte-2.91-common"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-37535"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6833-1.json"}},{"package":{"name":"vte2.91","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/vte2.91@0.68.0-1ubuntu0.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.68.0-1ubuntu0.1"}]}],"versions":["0.64.2-1ubuntu1","0.64.2-3","0.66.1-1","0.66.2-1","0.66.2-1build1","0.67.90-2","0.68.0-1"],"ecosystem_specific":{"binaries":[{"binary_version":"0.68.0-1ubuntu0.1","binary_name":"gir1.2-vte-2.91"},{"binary_version":"0.68.0-1ubuntu0.1","binary_name":"libvte-2.91-0"},{"binary_version":"0.68.0-1ubuntu0.1","binary_name":"libvte-2.91-common"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-37535"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6833-1.json"}},{"package":{"name":"vte2.91","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/vte2.91@0.76.0-1ubuntu0.1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.76.0-1ubuntu0.1"}]}],"versions":["0.74.0-2","0.74.1-1","0.74.1-1build1","0.74.2-1","0.75.91-2","0.75.92-1build1","0.75.92-1build2","0.76.0-1"],"ecosystem_specific":{"binaries":[{"binary_version":"0.76.0-1ubuntu0.1","binary_name":"gir1.2-vte-2.91"},{"binary_version":"0.76.0-1ubuntu0.1","binary_name":"gir1.2-vte-3.91"},{"binary_version":"0.76.0-1ubuntu0.1","binary_name":"libvte-2.91-0"},{"binary_version":"0.76.0-1ubuntu0.1","binary_name":"libvte-2.91-common"},{"binary_version":"0.76.0-1ubuntu0.1","binary_name":"libvte-2.91-gtk4-0"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:24.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-37535"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6833-1.json"}}],"schema_version":"1.7.5"}