From owner-svn-ports-head@FreeBSD.ORG Thu Mar 5 22:10:27 2015 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 9F241EF; Thu, 5 Mar 2015 22:10:27 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 6F232FB3; Thu, 5 Mar 2015 22:10:27 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t25MAR1a007522; Thu, 5 Mar 2015 22:10:27 GMT (envelope-from mandree@FreeBSD.org) Received: (from mandree@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t25MAR1F007521; Thu, 5 Mar 2015 22:10:27 GMT (envelope-from mandree@FreeBSD.org) Message-Id: <201503052210.t25MAR1F007521@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: mandree set sender to mandree@FreeBSD.org using -f From: Matthias Andree Date: Thu, 5 Mar 2015 22:10:27 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r380553 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Mar 2015 22:10:27 -0000 Author: mandree Date: Thu Mar 5 22:10:26 2015 New Revision: 380553 URL: https://svnweb.freebsd.org/changeset/ports/380553 QAT: https://qat.redports.org/buildarchive/r380553/ Log: Document recently fixed PuTTY < 0.64 vuln. CVE-2015-2157. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Mar 5 21:23:01 2015 (r380552) +++ head/security/vuxml/vuln.xml Thu Mar 5 22:10:26 2015 (r380553) @@ -57,6 +57,44 @@ Notes: --> + + PuTTY -- fails to scrub private keys from memory after use + + + putty + 0.64 + + + + +

Simon Tatham reports:

+
+

When PuTTY has sensitive data in memory and has no further need for + it, it should wipe the data out of its memory, in case malware later + gains access to the PuTTY process or the memory is swapped out to + disk or written into a crash dump file. An obvious example of this + is the password typed during SSH login; other examples include + obsolete session keys, public-key passphrases, and the private + halves of public keys.

+

PuTTY 0.63 and earlier versions, after loading a private key + from a disk file, mistakenly leak a memory buffer containing a + copy of the private key, in the function ssh2_load_userkey. The + companion function ssh2_save_userkey (only called by PuTTYgen) can + also leak a copy, but only in the case where the file it tried to + save to could not be created.

+
+ +
+ + http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html + CVE-2015-2157 + + + 2015-02-28 + 2015-03-05 + +
+ chromium -- multiple vulnerabilities