Package: vte / 1:0.28.2-5

Metadata

Package Version Patches format
vte 1:0.28.2-5 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
01_scroll_notebook.patch | (download)

src/vte.c | 7 7 + 0 - 0 !
1 file changed, 7 insertions(+)

---
02_meta.patch | (download)

src/keymap.c | 15 13 + 2 - 0 !
src/keymap.h | 2 1 + 1 - 0 !
2 files changed, 14 insertions(+), 3 deletions(-)

 [patch] map both gdk's meta and alt to vte's meta for >=gtk+-3.2.2
 compatibility

Also, since VTE_META_MASK is now a mask with multiple bits set, code that
compares gdk key modifiers to VTE_META_MASK by numerical equality is no
longer guaranteed to work. Therefore, for such comparisons a new function,
vte_keymap_fixup_modifiers, is introduced; it ensures that if any bits
matching matching VTE_META_MASK are set, then all are set.

https://bugzilla.gnome.org/show_bug.cgi?id=663779

03_CVE 2012 2738.patch | (download)

src/table.c | 2 1 + 1 - 0 !
src/vteseq.c | 2 1 + 1 - 0 !
2 files changed, 2 insertions(+), 2 deletions(-)

 emulation: limit integer arguments to 65535

To guard against malicious sequences containing excessively big numbers,
limit all parsed numbers to 16 bit range. Doing this here in the parsing
routine is a catch-all guard; this doesn't preclude enforcing
more stringent limits in the handlers themselves.

https://bugzilla.gnome.org/show_bug.cgi?id=676090

04_CVE 2012 2738.patch | (download)

src/vteseq.c | 25 18 + 7 - 0 !
1 file changed, 18 insertions(+), 7 deletions(-)

 emulation: limit repetitions

Don't allow malicious sequences to cause excessive repetitions.

https://bugzilla.gnome.org/show_bug.cgi?id=676090

25_optional ncurses.patch | (download)

configure.in | 83 45 + 38 - 0 !
src/keymap.c | 6 5 + 1 - 0 !
src/ssfe.c | 2 1 + 1 - 0 !
3 files changed, 51 insertions(+), 40 deletions(-)

---
60_termcap home end.patch | (download)

termcaps/xterm | 1 1 + 0 - 0 !
1 file changed, 1 insertion(+)

---