Fixes the following security issue:
CVE-2021-27135: xterm through Patch #365 allows remote attackers to cause a
denial of service (segmentation fault) or possibly have unspecified other
impact via a crafted UTF-8 character sequence.
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
# Locally calculated after checking pgp signature
-sha256 d81a3639e26552b6765bdcf28be1ecdb8acabf907955708e830ad6397ea10b48 xterm-363.tgz
+sha256 858b2885963fe97e712739066aadc1baeba2b33a0016303a7fec7d38bc73bf6e xterm-366.tgz
# Locally calculated
-sha256 c655a5fa3dec936543e02f863b8c1343d08522a2821cb484df6c5f62afa7354d COPYING
+sha256 dfb668cc977e24649500f3cc54de3e2b793928d210715a445ab1227930b07ba6 COPYING
#
################################################################################
-XTERM_VERSION = 363
+XTERM_VERSION = 366
XTERM_SOURCE = xterm-$(XTERM_VERSION).tgz
XTERM_SITE = http://invisible-mirror.net/archives/xterm
XTERM_DEPENDENCIES = ncurses xlib_libXaw host-pkgconf