[Git][security-tracker-team/security-tracker][master] Add TODO item for putty and CVE-2019-989{4,5,7,8} issues

Salvatore Bonaccorso carnil at debian.org
Thu Mar 21 12:23:08 GMT 2019


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
d13e8c0f by Salvatore Bonaccorso at 2019-03-21T12:21:32Z
Add TODO item for putty and CVE-2019-989{4,5,7,8} issues

The issue might be fixed already with the targetted upload to unstable
as 0.70-6 with the following changelog entry:

	 putty (0.70-6) unstable; urgency=high
	 .
	   * Apply security patch series from upstream:
	     - New facility for removing pending toplevel callbacks.
	     - Fix one-byte buffer overrun in random_add_noise().
	     - uxnet: clean up callbacks when closing a NetSocket.
	     - sk_tcp_close: fix memory leak of output bufchain.
	     - Fix handling of bad RSA key with n=p=q=0.
	     - Sanity-check the 'Public-Lines' field in ppk files.
	     - Introduce an enum of the uxsel / select_result flags.
	     - Switch to using poll(2) in place of select(2).
	     - RSA kex: enforce the minimum key length.
	     - Fix crash on ESC#6 + combining chars + GTK + odd-width terminal.
	     - Limit the number of combining chars per terminal cell.
	     - minibidi: fix read past end of line in rule W5.

but CVE commit association needs to be determined.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,17 +1,21 @@
 CVE-2019-9898 (Potential recycling of random numbers used in cryptography exists with ...)
 	[experimental] - putty 0.71-1
 	- putty <unfixed>
+	TODO: check, might be fixed in 0.70-6 already
 CVE-2019-9897 (Multiple denial-of-service attacks that can be triggered by writing to ...)
 	[experimental] - putty 0.71-1
 	- putty <unfixed>
+	TODO: check, might be fixed in 0.70-6 already
 CVE-2019-9896 (In PuTTY versions before 0.71 on Windows, local attackers could hijack ...)
 	- putty <not-affected> (Only affects PuTTY specific on Windows)
 CVE-2019-9895 (In PuTTY versions before 0.71 on Unix, a remotely triggerable buffer o ...)
 	[experimental] - putty 0.71-1
 	- putty <unfixed>
+	TODO: check, might be fixed in 0.70-6 already
 CVE-2019-9894 (A remotely triggerable memory overwrite in RSA key exchange in PuTTY b ...)
 	[experimental] - putty 0.71-1
 	- putty <unfixed>
+	TODO: check, might be fixed in 0.70-6 already
 CVE-2019-9892
 	RESERVED
 CVE-2019-9891



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/d13e8c0fccbea4ca1baa31e553fe74f6041878ab

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/d13e8c0fccbea4ca1baa31e553fe74f6041878ab
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190321/7e050588/attachment.html>


More information about the debian-security-tracker-commits mailing list