[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1763-1] putty security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : putty
Version        : 0.63-10+deb8u2
CVE ID         : CVE-2019-9894 CVE-2019-9897 CVE-2019-9898


Multiple vulnerabilities were found in the PuTTY SSH client, which could result in denial of service and potentially the execution of arbitrary code. In addition, in some situations random numbers could potentially be re-used.


For Debian 8 "Jessie", these problems have been fixed in version 0.63-10+deb8u2.

We recommend that you upgrade your putty packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
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=L9L0
-----END PGP SIGNATURE-----


Reply to: