Your message dated Wed, 22 Mar 2017 15:19:12 +0000
with message-id <e1cqi2a-000ixy...@fasolo.debian.org>
and subject line Bug#857642: fixed in putty 0.67-3
has caused the Debian Bug report #857642,
regarding putty: CVE-2017-6542: integer overflow permits memory overwrite by 
forwarded ssh-agent connections
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
857642: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857642
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: putty
Version: 0.63-10
Severity: grave
Tags: security upstream patch
Justification: user security hole

Hi,

the following vulnerability was published for putty.

CVE-2017-6542[0]:
|integer overflow permits memory overwrite by forwarded ssh-agent
|connections

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-6542
[1] 
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
[2] 
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: putty
Source-Version: 0.67-3

We believe that the bug you reported is fixed in the latest version of
putty, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 857...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwat...@debian.org> (supplier of updated putty package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 22 Mar 2017 14:42:13 +0000
Source: putty
Binary: pterm putty putty-tools putty-doc
Architecture: source
Version: 0.67-3
Distribution: unstable
Urgency: high
Maintainer: Colin Watson <cjwat...@debian.org>
Changed-By: Colin Watson <cjwat...@debian.org>
Description:
 pterm      - PuTTY terminal emulator
 putty      - Telnet/SSH client for X
 putty-doc  - PuTTY HTML documentation
 putty-tools - command-line tools for SSH, SCP, and SFTP
Closes: 857642
Changes:
 putty (0.67-3) unstable; urgency=high
 .
   * CVE-2017-6542: Sanity-check message length fields in CHAN_AGENT input
     (thanks, Simon Tatham; closes: #857642).
Checksums-Sha1:
 bd7367ba77e6928ad6c9789e7a4bcd94bee4d2d8 2150 putty_0.67-3.dsc
 0e3c543c3e3670cec0bbaaf0569a8ed83248763a 19612 putty_0.67-3.debian.tar.xz
 fccb1f30dcd7f93e80ceb9506846de7ca2f3a72f 7353 putty_0.67-3_source.buildinfo
Checksums-Sha256:
 2ccec198204b6d7cc6e28cce0a68ff8630645088cd5cf3683a7ec83c957c58d4 2150 
putty_0.67-3.dsc
 e4b63d472edd133d70db48d00dbf1f6bcc3e2698c84c71f5732c54e7388ef010 19612 
putty_0.67-3.debian.tar.xz
 20db1c2cfbd51ec8e03aeb4f3cfeaf0f871bccd2e3d293ae34fc859ecb313f47 7353 
putty_0.67-3_source.buildinfo
Files:
 97c828879657fa426f047392d5cc994f 2150 net optional putty_0.67-3.dsc
 a64543d8452ddc3b4058d5f573a7a744 19612 net optional putty_0.67-3.debian.tar.xz
 acebe5e65c5f5e124068cd4e37928b9d 7353 net optional 
putty_0.67-3_source.buildinfo

-----BEGIN PGP SIGNATURE-----
Comment: Colin Watson <cjwat...@debian.org> -- Debian developer

iQIzBAEBCAAdFiEErApP8SYRtvzPAcEROTWH2X2GUAsFAljSkH0ACgkQOTWH2X2G
UAuIsRAAhE9c0V8F1znoymsXSqlwX5w5H8g5oLqZ11906E3rSMAxi2/ybrd0TOne
WL/TELDv40dcwMyLTaqT4iCx8xFRqrcsxnBTkcRcKZWVcA5c7Bc4YyIMgWr4/cSB
oFxnowCmu0Vc99pu2VJKV+a0z4REMxs+gVkmk03mUKQqR6KbxyCINItcovUJO90V
dbPmXS2pykMVatzA3O3BkU3uMMiMXA90O4nM+OezSdkA5bB1QYL/Oy1bvWeXwJKy
YUiGj1w6ou/+iaDPRgkMJYg0ibDUXingYSgnaGNeTOzAcQT/wGpsqfRpQpg7/ZzL
lXax6srwPio6fDRsZQ/yfxniqj2Ze9GwHv1UmdU3jovf0Tw5jVVAxynSUbn303JN
tqzKYKoPYpZ2UYpeqywKH8Eqpdv9ScRk4JMND7i8vGN7lpXaGpCCU5DlI4CReiw7
LcHjX1SvSGynPaRr2iyZZT5CjAuB8msTi3pE5yoj/rS+HuFwGZoyyolumOxg9z9N
EYK5UZveDyUAlsphGPuZ6O8H7awzGMkF8ZLt1SHvNN6Z7kTI6sXWQNWgO+FH8+vQ
6wDI/g0duSg4RXpunYizCcx0t9AUFvscrmC46BtPuL9RZhA1ulAj0XdW4h4Qj+mf
s0HAEFmKEieKWCMoS3DnpODi0MQ7dyQHWzY0RVG8+okCeKElEC4=
=H/K/
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to