Publishing details
Changelog
putty (0.62-6ubuntu0.1) precise; urgency=low
* CVE-2013-4206: Buffer underrun in modmul could corrupt the heap.
* CVE-2013-4852: Negative string length in public-key signatures could
cause integer overflow and overwrite all of memory (closes: #718779).
* CVE-2013-4207: Non-coprime values in DSA signatures can cause buffer
overflow in modular inverse.
* CVE-2013-4208: Private keys were left in memory after being used by
PuTTY tools.
* Backport some general proactive potentially-security-relevant tightening
from upstream.
-- Colin Watson <email address hidden> Wed, 07 Aug 2013 11:44:22 +0100
Builds
Built packages
-
pterm
PuTTY terminal emulator
-
putty
Telnet/SSH client for X
-
putty-doc
PuTTY HTML documentation
-
putty-tools
command-line tools for SSH, SCP, and SFTP
Package files