MGASA-2015-0442

Source
https://advisories.mageia.org/MGASA-2015-0442.html
Import Source
https://advisories.mageia.org/MGASA-2015-0442.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0442
Related
Published
2015-11-10T21:26:39Z
Modified
2015-11-10T21:20:02Z
Summary
Updated putty packages fix security vulnerability
Details

Versions of PuTTY 0.54 and 0.65 inclusive have a potentially memory-corrupting integer overflow in the handling of the ECH (erase characters) control sequence in the terminal emulator (CVE-2015-5309).

References
Credits

Affected packages

Mageia:5 / putty

Package

Name
putty
Purl
pkg:rpm/mageia/putty?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.66-1.mga5

Ecosystem specific

{
    "section": "core"
}