Arch Linux

Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines

Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#73565 - [xterm] [security] sixel buffer overflow

Attached to Project: Arch Linux
Opened by T.J. Townsend (blakkheim) - Sunday, 30 January 2022, 17:46 GMT
Last edited by Andreas Radke (AndyRTR) - Monday, 31 January 2022, 07:55 GMT
Task Type Bug Report
Category Packages: Extra
Status Closed
Assigned To Andreas Radke (AndyRTR)
Architecture All
Severity Low
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Description:
A vulnerability (or class of vulnerabilities) was discovered in xterm's sixel code. I'd like to propose removing the "--enable-sixel-graphics" line from the PKGBUILD since this is a fairly obscure feature.

Additional info:
https://seclists.org/oss-sec/2022/q1/105

This task depends upon

Closed by  Andreas Radke (AndyRTR)
Monday, 31 January 2022, 07:55 GMT
Reason for closing:  Fixed
Additional comments about closing:  370-2

Loading...