Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 17 Mar 2019 14:16:03 +0000 (UTC)
From:      Matthias Andree <mandree@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r496062 - head/security/vuxml
Message-ID:  <201903171416.x2HEG3xN098847@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: mandree
Date: Sun Mar 17 14:16:03 2019
New Revision: 496062
URL: https://svnweb.freebsd.org/changeset/ports/496062

Log:
  Record PuTTY security vulnerabilities in versions before 0.71.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sun Mar 17 14:14:27 2019	(r496061)
+++ head/security/vuxml/vuln.xml	Sun Mar 17 14:16:03 2019	(r496062)
@@ -58,6 +58,48 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="46e1ece5-48bd-11e9-9c40-080027ac955c">
+    <topic>PuTTY -- security fixes in new release</topic>
+    <affects>
+      <package>
+	<name>putty</name>
+	<range><lt>0.71</lt></range>
+      </package>
+      <package>
+	<name>putty-gtk2</name>
+	<range><lt>0.71</lt></range>
+      </package>
+      <package>
+	<name>putty-nogtk</name>
+	<range><lt>0.71</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The PuTTY team reports:</p>
+	<blockquote cite="https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html">;
+	  <p>New in 0.71:</p>
+	  <ul>
+	    <li>Security fixes found by an EU-funded bug bounty programme:</li>
+	    <li>+ a remotely triggerable memory overwrite in RSA key exchange, which can occur before host key verification</li>
+	    <li>+ potential recycling of random numbers used in cryptography</li>
+	    <li>+ on Unix, remotely triggerable buffer overflow in any kind of server-to-client forwarding</li>
+	    <li>+ multiple denial-of-service attacks that can be triggered by writing to the terminal</li>
+	    <li>Other security enhancements: major rewrite of the crypto code to remove cache and timing side channels.</li>
+	    <li>User interface changes to protect against fake authentication prompts from a malicious server.</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html</url>;
+    </references>
+    <dates>
+      <discovery>2019-03-16</discovery>
+      <entry>2019-03-17</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="72a6e3be-483a-11e9-92d7-f1590402501e">
     <topic>Jupyter notebook -- cross-site inclusion (XSSI) vulnerability</topic>
     <affects>
@@ -88,6 +130,15 @@ Notes:
     </description>
     <references>
       <url>https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst</url>;
+      <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-auth-prompt-spoofing.html</url>;
+      <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-fd-set-overflow.html</url>;
+      <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-rng-reuse.html</url>;
+      <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-rsa-kex-integer-overflow.html</url>;
+      <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-terminal-dos-combining-chars.html</url>;
+      <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-terminal-dos-combining-chars-double-width-gtk.html</url>;
+      <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-terminal-dos-one-column-cjk.html</url>;
+      <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/pscp-unsanitised-server-output.html</url>;
+      <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/side-channels.html</url>;
     </references>
     <dates>
       <discovery>2019-03-10</discovery>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201903171416.x2HEG3xN098847>