On Thu, 22 Aug 2013 07:24:05 -0500, John McKown wrote:

>According to Gentoo at
>http://www.linuxsecurity.com/content/view/159880?rdf
>
><quote>
>
>Description
>===========
>
>Multiple vulnerabilities have been discovered in PuTTY. Please review
>the CVE identifiers referenced below for details.
>
>Impact
>======
    ...
Affected packages
=================
    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  net-misc/putty                < 0.63                     >= 0.63

    
And on the PuTTY home page at:

    http://www.chiark.greenend.org.uk/~sgtatham/putty/

The latest version is beta 0.63. 

Latest news

2013-08-06 PuTTY 0.63 released, fixing SECURITY HOLES

PuTTY 0.63, released today, fixes four security holes in 0.62 and before: 
vuln-modmul, vuln-signature-stringlen, vuln-bignum-division-by-zero, 
private-key-not-wiped. Other than that, there are mostly bug fixes from 0.62 
and a few small features. 

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to