Summary: | <net-misc/putty-0.68: integer overflow permits memory overwrite by forwarded ssh-agent connections | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Thomas Deutschmann (RETIRED) <whissi> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | jer |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html | ||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=610554 | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: |
=net-misc/putty-0.68
|
Runtime testing required: | --- |
Description
Thomas Deutschmann (RETIRED)
![]() @ Maintainer(s): Please bump to >=net-misc/putty-0.68. Arch teams, please test and mark stable: =net-misc/putty-0.68 Targeted stable KEYWORDS : alpha amd64 hppa ppc ppc64 sparc x86 Stable for HPPA PPC64. amd64 stable x86 stable ppc stable sparc stable Stable on alpha. Arches and Maintainer(s), Thank you for your work. New GLSA Request filed. This issue was resolved and addressed in GLSA 201703-03 at https://security.gentoo.org/glsa/201703-03 by GLSA coordinator Thomas Deutschmann (whissi). |