Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#73565 - [xterm] [security] sixel buffer overflow
Attached to Project:
Arch Linux
Opened by T.J. Townsend (blakkheim) - Sunday, 30 January 2022, 17:46 GMT
Last edited by Andreas Radke (AndyRTR) - Monday, 31 January 2022, 07:55 GMT
Opened by T.J. Townsend (blakkheim) - Sunday, 30 January 2022, 17:46 GMT
Last edited by Andreas Radke (AndyRTR) - Monday, 31 January 2022, 07:55 GMT
|
DetailsDescription:
A vulnerability (or class of vulnerabilities) was discovered in xterm's sixel code. I'd like to propose removing the "--enable-sixel-graphics" line from the PKGBUILD since this is a fairly obscure feature. Additional info: https://seclists.org/oss-sec/2022/q1/105 |
This task depends upon
Closed by Andreas Radke (AndyRTR)
Monday, 31 January 2022, 07:55 GMT
Reason for closing: Fixed
Additional comments about closing: 370-2
Monday, 31 January 2022, 07:55 GMT
Reason for closing: Fixed
Additional comments about closing: 370-2