stable

putty-0.63-6.el5

FEDORA-EPEL-2016-71908aa997 created by jskarvad 10 years ago for Fedora EPEL 5

This is an update fixing possible buffer overflow in SCP protocol when parsing server response (CVE-2016-2563).

This update has been submitted for testing by jskarvad.

10 years ago

This update has been pushed to testing.

10 years ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

10 years ago

This update has been submitted for stable by jskarvad.

10 years ago

This update has been pushed to stable.

10 years ago
User Icon anonymous provided feedback 9 years ago

Please log in to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
disabled
Dates
submitted
10 years ago
in testing
10 years ago
in stable
10 years ago
BZ#1316481 CVE-2016-2563 putty: old-style scp downloads may allow remote code execution
0
0
BZ#1316486 CVE-2016-2563 putty: old-style scp downloads may allow remote code execution [epel-5]
0
0

Automated Test Results