Bug#989041: eterm: CVE-2021-33477

2021-06-10 Thread Utkarsh Gupta
Hi Jose, On Thu, Jun 10, 2021 at 11:08 PM Jose Antonio Jimenez Madrid wrote: > Thank you so much Utkarsh for the patch, Of course, no problem! :) > Please, upload it to unstable, as I have to upload it by Debian Mentors > so it will reach testing faster if you upload it to fix this security bu

Bug#989041: eterm: CVE-2021-33477

2021-06-10 Thread Jose Antonio Jimenez Madrid
Thank you so much Utkarsh for the patch, Please, upload it to unstable, as I have to upload it by Debian Mentors so it will  reach testing faster if you upload it to fix this security bug. Also, you can upload it to buster-pu, the package version is the same than in Stretch, so it just to upload

Bug#989041: eterm: CVE-2021-33477

2021-06-09 Thread Utkarsh Gupta
Hi Jose, Patch attached. Please let me know if I can upload to unstable directly? This also needs to go to buster-pu. Let me know if you have questions or concerns. - u --- a/src/term.c +++ b/src/term.c @@ -1176,6 +1176,11 @@ case 'E': scr_add_lines((unsigned char *) "\n\r

Bug#989041: eterm: CVE-2021-33477

2021-05-30 Thread Jose Antonio Jimenez Madrid
Thank you Salvatore for submitting this important bug. I have sent this information to upstream and I have read the information you provided. It is the first time I have to deal with a security bug, so I do not know the right procedure to follow. I suppose there is a script or procedure to check

Bug#989041: eterm: CVE-2021-33477

2021-05-24 Thread Salvatore Bonaccorso
Source: eterm Version: 0.9.6-6 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 0.9.6-5 Hi, The following vulnerability was published for eterm. Strictly speaking the severity to RC is overrated, but I think it is sensible to make s