On Sun, 2013-08-11 at 14:55 -0500, Robert Wolfe wrote:
> Has Simon Tatham been advised of this,

One would have hoped the answer to that would have been obvious ("yes"),
but if not then a quick look at
http://www.chiark.greenend.org.uk/~sgtatham/putty/ would lead to:

<quote>
 2013-08-06 PuTTY 0.63 released, fixing SECURITY HOLES

PuTTY 0.63, released today, fixes four security holes in 0.62 and
before: vuln-modmul, vuln-signature-stringlen,
vuln-bignum-division-by-zero, private-key-not-wiped. Other than that,
there are mostly bug fixes from 0.62 and a few small features. 
</quote>

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1376251496.25627.40.ca...@jacala.jungle.funky-badger.org

Reply via email to