File _patchinfo of Package patchinfo.10883
<patchinfo incident="10883"> <issue tracker="bnc" id="1144548">VUL-1: putty: integer underflow parsing SSH-1 packet length</issue> <issue tracker="bnc" id="1144547">VUL-1: putty: buffer overflow in SSH-1 if server sends two tiny RSA keys</issue> <category>security</category> <rating>moderate</rating> <packager>jengelh</packager> <description>This update for putty fixes the following issues: Update to new upstream release 0.72 [boo#1144547, boo#1144548] * Fixed two separate vulnerabilities affecting the obsolete SSH-1 protocol, both available before host key checking. * Fixed a vulnerability in all the SSH client tools (PuTTY, Plink, PSFTP and PSCP) if a malicious program can impersonate Pageant. * Fixed a crash in GSSAPI / Kerberos key exchange triggered if the server provided an ordinary SSH host key as part of the exchange. </description> <summary>Recommended update for putty</summary> </patchinfo>