Fedora 8 Update: xterm-238-1.fc8
Summary
The xterm program is a terminal emulator for the X Window System. It
provides DEC VT102 and Tektronix 4014 compatible terminals for
programs that can't use the window system directly.
This update fixes the following security issue: CRLF injection vulnerability
in xterm allows user-assisted attackers to execute arbitrary commands via LF
(aka \n) characters surrounding a command name within a Device Control Request
Status String (DECRQSS) escape sequence in a text file, a related issue to
CVE-2003-0063 and CVE-2003-0071.
* Tue Jan 6 2009 Miroslav Lichvar
- update to 238 (#479000, CVE-2008-2383)
- set default values of allowWindowOps and allowFontOps resources to false
* Wed Jul 30 2008 Miroslav Lichvar
- update to 236
- enable support for spawn-new-terminal action (#457130)
* Tue Apr 22 2008 Miroslav Lichvar
- update to 235
* Mon Mar 3 2008 Miroslav Lichvar
- update to 234
* Wed Feb 27 2008 Miroslav Lichvar
- update to 233
* Thu Jan 31 2008 Miroslav Lichvar
- update to 232
* Mon Jan 7 2008 Miroslav Lichvar
- update to 231
- remove setgid utempter from xterm binary (#229360)
* Fri Jan 4 2008 Miroslav Lichvar
- update to 230
[ 1 ] Bug #479000 - xterm executes arbitrary commands
https://bugzilla.redhat.com/show_bug.cgi?id=479000
su -c 'yum update xterm' at the command line.
For more information, refer to "Managing Software with yum",
available at .
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce
FEDORA-2009-0154 2009-01-07 06:46:14 Product : Fedora 8 Version : 238 Release : 1.fc8 URL : Summary : Terminal emulator for the X Window System Description : The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly. This update fixes the following security issue: CRLF injection vulnerability in xterm allows user-assisted attackers to execute arbitrary commands via LF (aka \n) characters surrounding a command name within a Device Control Request Status String (DECRQSS) escape sequence in a text file, a related issue to CVE-2003-0063 and CVE-2003-0071. * Tue Jan 6 2009 Miroslav Lichvar 238-1 - update to 238 (#479000, CVE-2008-2383) - set default values of allowWindowOps and allowFontOps resources to false * Wed Jul 30 2008 Miroslav Lichvar 236-1 - update to 236 - enable support for spawn-new-terminal action (#457130) * Tue Apr 22 2008 Miroslav Lichvar 235-1 - update to 235 * Mon Mar 3 2008 Miroslav Lichvar 234-1 - update to 234 * Wed Feb 27 2008 Miroslav Lichvar 233-1 - update to 233 * Thu Jan 31 2008 Miroslav Lichvar 232-1 - update to 232 * Mon Jan 7 2008 Miroslav Lichvar 231-1 - update to 231 - remove setgid utempter from xterm binary (#229360) * Fri Jan 4 2008 Miroslav Lichvar 230-1 - update to 230 [ 1 ] Bug #479000 - xterm executes arbitrary commands https://bugzilla.redhat.com/show_bug.cgi?id=479000 su -c 'yum update xterm' at the command line. For more information, refer to "Managing Software with yum", available at . All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at Fedora-package-announce mailing list Fedora-package-announce@redhat.com http://www.redhat.com/mailman/listinfo/fedora-package-announce
Change Log
References