[Git][security-tracker-team/security-tracker][master] Add TODO item for putty and CVE-2019-989{4,5,7,8} issues
Salvatore Bonaccorso
carnil at debian.org
Thu Mar 21 12:23:08 GMT 2019
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d13e8c0f by Salvatore Bonaccorso at 2019-03-21T12:21:32Z
Add TODO item for putty and CVE-2019-989{4,5,7,8} issues
The issue might be fixed already with the targetted upload to unstable
as 0.70-6 with the following changelog entry:
putty (0.70-6) unstable; urgency=high
.
* Apply security patch series from upstream:
- New facility for removing pending toplevel callbacks.
- Fix one-byte buffer overrun in random_add_noise().
- uxnet: clean up callbacks when closing a NetSocket.
- sk_tcp_close: fix memory leak of output bufchain.
- Fix handling of bad RSA key with n=p=q=0.
- Sanity-check the 'Public-Lines' field in ppk files.
- Introduce an enum of the uxsel / select_result flags.
- Switch to using poll(2) in place of select(2).
- RSA kex: enforce the minimum key length.
- Fix crash on ESC#6 + combining chars + GTK + odd-width terminal.
- Limit the number of combining chars per terminal cell.
- minibidi: fix read past end of line in rule W5.
but CVE commit association needs to be determined.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,17 +1,21 @@
CVE-2019-9898 (Potential recycling of random numbers used in cryptography exists with ...)
[experimental] - putty 0.71-1
- putty <unfixed>
+ TODO: check, might be fixed in 0.70-6 already
CVE-2019-9897 (Multiple denial-of-service attacks that can be triggered by writing to ...)
[experimental] - putty 0.71-1
- putty <unfixed>
+ TODO: check, might be fixed in 0.70-6 already
CVE-2019-9896 (In PuTTY versions before 0.71 on Windows, local attackers could hijack ...)
- putty <not-affected> (Only affects PuTTY specific on Windows)
CVE-2019-9895 (In PuTTY versions before 0.71 on Unix, a remotely triggerable buffer o ...)
[experimental] - putty 0.71-1
- putty <unfixed>
+ TODO: check, might be fixed in 0.70-6 already
CVE-2019-9894 (A remotely triggerable memory overwrite in RSA key exchange in PuTTY b ...)
[experimental] - putty 0.71-1
- putty <unfixed>
+ TODO: check, might be fixed in 0.70-6 already
CVE-2019-9892
RESERVED
CVE-2019-9891
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/d13e8c0fccbea4ca1baa31e553fe74f6041878ab
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/d13e8c0fccbea4ca1baa31e553fe74f6041878ab
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190321/7e050588/attachment.html>
More information about the debian-security-tracker-commits
mailing list