[comp.windows.x] X11R4 public fix #6 now available on expo xterm escape sequence hole

jim@EXPO.LCS.MIT.EDU (Jim Fulton) (03/13/90)

A 3 year old bug in the xterm logging escapes that can lead to security holes
(yet another good reason to use xmh or something like it :-) has been
identified.  A fix may be obtained via anonymous ftp from the machine
expo.lcs.mit.edu (18.30.0.212) in the file "/pub/R4/fixes/fix-6" or from
the xstuff server as follows (for more information, see below):

	% mail xstuff@expo.lcs.mit.edu
	Subject: send fixes 6
	path mymachine!me@uunet.uu.net
	^D

where mymachine!me@uunet.uunet is a path from expo.lcs.mit.edu back to you,
(see below).

				XSTUFF INFO

For those without ftp access, individual fixes can be obtained by mail by
sending a message to the archive server at xstuff@expo.lcs.mit.edu.  The
subject line should read

        send fixes 6

For a list of other fixes, send another message with a subject line of:

	index fixes

Information on other areas that are available from the xstuff server may
be obtained by sending another message with a subject line of:

	help

The xstuff server attempts to extract a return address from your message.  If
you are using a system that does not produce usable headers, you can specify
a particular return path in the body of your message, i.e.:

        path foo%bar.bitnet@mitvma.mit.edu
or
        path zot!gzork!me@uunet.uu.net