CVE-2020-5214 Error recovery after syntax error in configuration file is subject to a buffer overflow CVE-2020-5213 SYMBOL configuration file option is subject to a buffer overflow CVE-2020-5212 MENUCOLOR configuration file option is subject to a buffer overflow CVE-2020-5211 AUTOCOMPLETE configuration file option is subject to a buffer overflow CVE-2020-5210 NetHack command line -w option parsing is subject to a buffer overflow CVE-2020-5209 Command line parsing of options starting with -de and -i is subject to a buffer overflow CVE-2019-19905 Privilege escalation/remote code execution/crash in configuration parsing
That's six vulnerabilities because 3.6.4 supposedly fixed CVE-2019-19905 according to bug #706200.
@maintainer(s), please create an appropriate ebuild
3.6.6 addition: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=99ac822df309e7805ae6c557055f79a3532d06f4 cleanup: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ac2c30327e98c5d15c0fa0e94d11a6cabd997683 Closing because noglsa and tree is clean.