Package: foot
Version: 1.13.1-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: bir...@debian.org, Debian Security Team <t...@security.debian.org>


If an XTGETTCAP escape sequence printed to the terminal contains newline
characters, foot will echo the newline characters back into the PTY as
part of the "invalid capability" response. (XTGETTCAP strings are
supposed to be hex-encoded, so it's not valid for them to contain
newline characters.) In a cat/curl scenario, the user's shell will
receive those newline characters and execute any commands embedded in
the XTGETTCAP sequence as though they were typed in by the user.

Reply via email to