Source: eterm
Version: 0.9.6-6
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 0.9.6-5

Hi,

The following vulnerability was published for eterm.

Strictly speaking the severity to RC is overrated, but I think it is
sensible to make sure that the fix lands in bullseye. For buster the
issue is marked no-dsa and could be fixed via an upcoming point
release.

For reference see the rxvt-unicode fix (which disables the code).

CVE-2021-33477[0]:
| rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow
| (potentially remote) code execution because of improper handling of
| certain escape sequences (ESC G Q). A response is terminated by a
| newline.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-33477
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33477

Regards,
Salvatore

Reply via email to