Summary: | <app-misc/tmux-3.1c: Buffer overflow in escape sequence parser (CVE-2020-27347) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | shell-tools, zlogene |
Priority: | Normal | Keywords: | CC-ARCHES |
Version: | unspecified | Flags: | nattka:
sanity-check+
|
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.openwall.com/lists/oss-security/2020/11/05/3 | ||
Whiteboard: | B2 [glsa+ cve] | ||
Package list: |
app-misc/tmux-3.1c
|
Runtime testing required: | --- |
Description
Sam James
2020-11-05 14:06:39 UTC
amd64 done ppc done arm64 done arm done x86 done ppc64 stable sparc done hppa stable This issue was resolved and addressed in GLSA 202011-10 at https://security.gentoo.org/glsa/202011-10 by GLSA coordinator Sam James (sam_c). Reopening for cleanup. Reopening for stable/cleanup. s390 stable |