Hi Jose,
On Thu, Jun 10, 2021 at 11:08 PM Jose Antonio Jimenez Madrid
wrote:
> Thank you so much Utkarsh for the patch,
Of course, no problem! :)
> Please, upload it to unstable, as I have to upload it by Debian Mentors
> so it will reach testing faster if you upload it to fix this security bu
Thank you so much Utkarsh for the patch,
Please, upload it to unstable, as I have to upload it by Debian Mentors
so it will reach testing faster if you upload it to fix this security bug.
Also, you can upload it to buster-pu, the package version is the same
than in Stretch, so it just to upload
Hi Jose,
Patch attached. Please let me know if I can upload to unstable
directly? This also needs to go to buster-pu.
Let me know if you have questions or concerns.
- u
--- a/src/term.c
+++ b/src/term.c
@@ -1176,6 +1176,11 @@
case 'E':
scr_add_lines((unsigned char *) "\n\r
Thank you Salvatore for submitting this important bug.
I have sent this information to upstream and I have read the information
you provided.
It is the first time I have to deal with a security bug, so I do not
know the right procedure to follow.
I suppose there is a script or procedure to check
Source: eterm
Version: 0.9.6-6
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Control: found -1 0.9.6-5
Hi,
The following vulnerability was published for eterm.
Strictly speaking the severity to RC is overrated, but I think it is
sensible to make s
5 matches
Mail list logo