On Sun, 2013-08-11 at 14:55 -0500, Robert Wolfe wrote: > Has Simon Tatham been advised of this,
One would have hoped the answer to that would have been obvious ("yes"), but if not then a quick look at http://www.chiark.greenend.org.uk/~sgtatham/putty/ would lead to: <quote> 2013-08-06 PuTTY 0.63 released, fixing SECURITY HOLES PuTTY 0.63, released today, fixes four security holes in 0.62 and before: vuln-modmul, vuln-signature-stringlen, vuln-bignum-division-by-zero, private-key-not-wiped. Other than that, there are mostly bug fixes from 0.62 and a few small features. </quote> Regards, Adam -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/1376251496.25627.40.ca...@jacala.jungle.funky-badger.org