Summary: | <net-misc/putty-0.66: integer overflow and buffer underrun in terminal emulator's ECH handling (CVE-2015-5309) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Hanno Böck <hanno> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | jer |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-ech-overflow.html | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Hanno Böck
2015-11-07 17:03:00 UTC
Arch teams, please test and mark stable: =net-misc/putty-0.66 Targeted stable KEYWORDS : alpha amd64 hppa ppc ppc64 sparc x86 Stable for PPC64. Stable for HPPA. amd64 stable x86 stable ppc stable sparc stable alpha stable. Maintainer(s), please cleanup. Complete was completed. Added to existing GLSA. This issue was resolved and addressed in GLSA 201606-01 at https://security.gentoo.org/glsa/201606-01 by GLSA coordinator Yury German (BlueKnight) |