Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in PuTTY
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in PuTTY
ID: FEDORA-2013-14656
Distribution: Fedora
Plattformen: Fedora 19
Datum: Mi, 21. August 2013, 08:28
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4206
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4207
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4208
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4852
Applikationen: PuTTY

Originalnachricht

Name        : putty
Product : Fedora 19
Version : 0.63
Release : 1.fc19
URL : http://www.chiark.greenend.org.uk/~sgtatham/putty/
Summary : SSH, Telnet and Rlogin client
Description :
Putty is a SSH, Telnet & Rlogin client - this time for Linux.

-------------------------------------------------------------------------------
-
Update Information:

This is an update that fixes many bugs, for details see upstream announcement: changes.html
This is an update that fixes four CVEs:
CVE-2013-4206
CVE-2013-4207
CVE-2013-4208
CVE-2013-4852

-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Aug 12 2013 Jaroslav Škarvada <jskarvad@redhat.com> - 0.63-1
- New version
Resolves: rhbz#995610
- Dropped perms, CVE-2013-4852, CVE-2013-4206, CVE-2013-4207,
CVE-2013-4208 patches (all in upstream)
* Thu Aug 8 2013 Jaroslav Škarvada <jskarvad@redhat.com> - 0.62-7
- Fixed a heap-corrupting buffer underrun bug in the modmul function
Resolves: CVE-2013-4206
- Fixed a buffer overflow vulnerability in the calculation of modular
inverses when verifying a DSA signature
Resolves: CVE-2013-4207
- Fixed problem when private keys are left in memory after being
used by PuTTY tools
Resolves: CVE-2013-4208
* Mon Aug 5 2013 Jaroslav Škarvada <jskarvad@redhat.com> - 0.62-6
- Fixed integer overflow
Resolves: CVE-2013-4852
- Fixed bogus dates in changelog (best estimated)
* Sun Aug 4 2013 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 0.62-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #993031 - CVE-2013-4206 CVE-2013-4207 CVE-2013-4208 CVE-2013-4852
putty: Integer overflow, leading to heap-based buffer overflow during SSH handshake
https://bugzilla.redhat.com/show_bug.cgi?id=993031
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update putty' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung