Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#74449 - [xterm] sixel buffer overflow has been fixed
Attached to Project:
Arch Linux
Opened by Jakub Łukasiewicz (Jorengarenar) - Monday, 11 April 2022, 23:59 GMT
Last edited by Andreas Radke (AndyRTR) - Saturday, 21 May 2022, 19:14 GMT
Opened by Jakub Łukasiewicz (Jorengarenar) - Monday, 11 April 2022, 23:59 GMT
Last edited by Andreas Radke (AndyRTR) - Saturday, 21 May 2022, 19:14 GMT
|
DetailsDescription:
Looks like a vulnerability discovered in XTerm 370 in code handling sixel graphics has been patched in XTerm 371. Thus request to revert the temporary change in compilation flags and enable the feature again. Additional info: * https://invisible-island.net/xterm/xterm.log.html#xterm_371 * https://github.com/ThomasDickey/xterm-snapshots/commit/ba1eb195b5ceb7469168f40bde029328cf8c47f0#diff-5bfd5b139fba624a417eda54aea6b4c4ea92c5ae1a02931088043c6487bca713 |
This task depends upon
Closed by Andreas Radke (AndyRTR)
Saturday, 21 May 2022, 19:14 GMT
Reason for closing: Fixed
Additional comments about closing: 372-2
Saturday, 21 May 2022, 19:14 GMT
Reason for closing: Fixed
Additional comments about closing: 372-2