This bug was fixed in the package putty - 0.67-3+deb9u1build0.16.04.1
---------------
putty (0.67-3+deb9u1build0.16.04.1) xenial-security; urgency=medium
* fake sync from Debian (LP: #1821407)
putty (0.67-3+deb9u1) stretch-security; urgency=high
* Backport security fixes from 0.71:
- In random_add_noise, put the hashed noise into the pool, not the raw
noise.
- New facility for removing pending toplevel callbacks.
- CVE-2019-9898: Fix one-byte buffer overrun in random_add_noise().
- uxnet: clean up callbacks when closing a NetSocket.
- sk_tcp_close: fix memory leak of output bufchain.
- Fix handling of bad RSA key with n=p=q=0.
- Sanity-check the 'Public-Lines' field in ppk files.
- Introduce an enum of the uxsel / select_result flags.
- CVE-2019-9895: Switch to using poll(2) in place of select(2).
- CVE-2019-9894: RSA kex: enforce the minimum key length.
- CVE-2019-9897: Fix crash on ESC#6 + combining chars + GTK + odd-width
terminal.
- CVE-2019-9897: Limit the number of combining chars per terminal cell.
- minibidi: fix read past end of line in rule W5.
- CVE-2019-9897: Fix crash printing a width-2 char in a width-1
terminal.
-- Steve Beattie <[email protected]> Tue, 21 May 2019 10:43:51 -0700
** Changed in: putty (Ubuntu)
Status: New => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-9894
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-9895
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-9897
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1821407
Title:
Security vulnerabilities in Putty prior to 0.71
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/putty/+bug/1821407/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs