Package: putty / 0.60+2010-02-20-1+squeeze2
Metadata
Package | Version | Patches format |
---|---|---|
putty | 0.60+2010-02-20-1+squeeze2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
password not wiped.patch | (download) |
ssh.c |
7 7 + 0 - 0 ! |
passwords were left in memory using ssh keyboard-interactive auth |
vuln modmul.patch | (download) |
sshbn.c |
7 7 + 0 - 0 ! |
cve-2013-4206 Buffer underrun in modmul could corrupt the heap. |
vuln signature stringlen.patch | (download) |
import.c |
2 1 + 1 - 0 ! |
cve-2013-4852 Negative string length in public-key signatures could cause integer overflow and overwrite all of memory. |
vuln bignum division by zero.patch | (download) |
sshbn.c |
71 63 + 8 - 0 ! |
cve-2013-4207 Non-coprime values in DSA signatures can cause buffer overflow in modular inverse. |
private key not wiped.patch | (download) |
sshdss.c |
16 12 + 4 - 0 ! |
cve-2013-4208 Private keys were left in memory after being used by PuTTY tools. |
proactive tightening.patch | (download) |
import.c |
41 30 + 11 - 0 ! |
proactive potentially-security-relevant tightening Tighten up a lot of casts from unsigned to int which are read by one of the GET_32BIT macros and then used as length fields. Missing bounds checks against zero have been added, and also I've introduced a helper function toint() which casts from unsigned to int in such a way as to avoid C undefined behaviour, since I'm not sure I trust compilers any more to do the obviously sensible thing. |