*** This bug is a security vulnerability ***

Public security bug reported:
Putty 0.71 was released, patching major security vulnerabilities present
in previous versions. Vulnerabilities are laid out in the following CVE
reports, ranging in severity from High to Critical:

CVE-2019-9898   Potential recycling of random numbers used in cryptography 
exists within PuTTY before 0.71.
CVE-2019-9897   Multiple denial-of-service attacks that can be triggered by 
writing to the terminal exist in PuTTY versions before 0.71.
CVE-2019-9895   In PuTTY versions before 0.71 on Unix, a remotely triggerable 
buffer overflow exists in any kind of server-to-client forwarding.
CVE-2019-9894   A remotely triggerable memory overwrite in RSA key exchange in 
PuTTY before 0.71 can occur before host key verification. 

Threats can be mitigated by providing Putty 0.71 to Ubuntu via Apt on
Disco, Cosmic, Bionic, and Xenial, if not others.

** Affects: putty (Ubuntu)
     Importance: Undecided
         Status: New

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1821407

Title:
  Security vulnerabilities in Putty prior to 0.71

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/putty/+bug/1821407/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to