0cc7c63f91
Fixes the following security issue: CVE-2022-45063: xterm before 375 allows code execution via font ops, e.g., because an OSC 50 response may have Ctrl-g and therefore lead to command execution within the vi line-editing mode of Zsh: https://www.openwall.com/lists/oss-security/2022/11/10/1 Additionally, patch 376 fixes a null pointer access issue: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022942 Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
5 lines
241 B
Plaintext
5 lines
241 B
Plaintext
# Locally calculated after checking pgp signature
|
|
sha256 1e5bb7aad068fb31d6d3cbb77f80c7ad1526cd4c956a4ddcf2c5cf28af5334e1 xterm-376.tgz
|
|
# Locally calculated
|
|
sha256 9521ef761474cd31ea406f56a751646a7b42a9287cdc6f2f8e52ed4c4d2a73e7 COPYING
|