LWN.net Logo

Fedora alert FEDORA-2013-14676 (putty)

From:  updates@fedoraproject.org
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 18 Update: putty-0.63-1.fc18
Date:  Wed, 21 Aug 2013 00:01:06 +0000
Message-ID:  <20130821000106.6CFE5216D3@bastion01.phx2.fedoraproject.org>
Archive-link:  Article, Thread

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2013-14676 2013-08-12 16:54:32 -------------------------------------------------------------------------------- Name : putty Product : Fedora 18 Version : 0.63 Release : 1.fc18 URL : http://www.chiark.greenend.org.uk/~sgtatham/putty/ Summary : SSH, Telnet and Rlogin client Description : Putty is a SSH, Telnet & Rlogin client - this time for Linux. -------------------------------------------------------------------------------- Update Information: This is an update that fixes several bugs, for details see upstream announcement: http://www.chiark.greenend.org.uk/~sgtatham/putty/changes... This is an update that fixes four CVEs: CVE-2013-4206 CVE-2013-4207 CVE-2013-4208 CVE-2013-4852 -------------------------------------------------------------------------------- ChangeLog: * Mon Aug 12 2013 Jaroslav Škarvada <jskarvad@redhat.com> - 0.63-1 - New version Resolves: rhbz#995610 - Dropped perms, CVE-2013-4852, CVE-2013-4206, CVE-2013-4207, CVE-2013-4208 patches (all in upstream) * Thu Aug 8 2013 Jaroslav Škarvada <jskarvad@redhat.com> - 0.62-7 - Fixed a heap-corrupting buffer underrun bug in the modmul function Resolves: CVE-2013-4206 - Fixed a buffer overflow vulnerability in the calculation of modular inverses when verifying a DSA signature Resolves: CVE-2013-4207 - Fixed problem when private keys are left in memory after being used by PuTTY tools Resolves: CVE-2013-4208 * Mon Aug 5 2013 Jaroslav Škarvada <jskarvad@redhat.com> - 0.62-6 - Fixed integer overflow Resolves: CVE-2013-4852 - Fixed bogus dates in changelog (best estimated) * Sun Aug 4 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.62-5 - Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild * Thu Feb 14 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.62-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild -------------------------------------------------------------------------------- References: [ 1 ] Bug #993031 - CVE-2013-4206 CVE-2013-4207 CVE-2013-4208 CVE-2013-4852 putty: Integer overflow, leading to heap-based buffer overflow during SSH handshake https://bugzilla.redhat.com/show_bug.cgi?id=993031 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update putty' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds