On Thu, 22 Aug 2013 07:24:05 -0500, John McKown wrote:
>According to Gentoo at
>http://www.linuxsecurity.com/content/view/159880?rdf
>
><quote>
>
>Description
>===========
>
>Multiple vulnerabilities have been discovered in PuTTY. Please review
>the CVE identifiers referenced below for details.
>
>Impact
>======
...
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/putty < 0.63 >= 0.63
And on the PuTTY home page at:
http://www.chiark.greenend.org.uk/~sgtatham/putty/
The latest version is beta 0.63.
Latest news
2013-08-06 PuTTY 0.63 released, fixing SECURITY HOLES
PuTTY 0.63, released today, fixes four security holes in 0.62 and before:
vuln-modmul, vuln-signature-stringlen, vuln-bignum-division-by-zero,
private-key-not-wiped. Other than that, there are mostly bug fixes from 0.62
and a few small features.
-- gil
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN