On 2022-02-07 14:44 -0500, Chris Frey wrote:
> Just curious why this bug is marked high priority for stretch but
> low priority for buster and bullseye?
>
> https://tracker.debian.org/pkg/xterm
>
> Is there something different in their builds?
No, not really. The security team has decided
Just curious why this bug is marked high priority for stretch but
low priority for buster and bullseye?
https://tracker.debian.org/pkg/xterm
Is there something different in their builds?
Thanks,
- Chris
On Mon, Jan 31, 2022 at 08:37:03PM +0100, Salvatore Bonaccorso wrote:
> Source: xterm
> Version: 370-1
> Severity: important
> Tags: security upstream
> X-Debbugs-Cc: car...@debian.org, Debian Security Team
>
>
> Hi,
>
> The following vulnerability was published for xterm.
>
> CVE-2022-24130[0
Source: xterm
Version: 370-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for xterm.
CVE-2022-24130[0]:
| xterm through Patch 370, when Sixel support is enabled, allows
| attackers to trigger a bu
4 matches
Mail list logo