Bug 1152753 - (CVE-2019-17068) VUL-0: CVE-2019-17068 CVE-2019-17069: putty: multiple vulnerabilities fixed in 0.73
(CVE-2019-17068)
VUL-0: CVE-2019-17068 CVE-2019-17069: putty: multiple vulnerabilities fixed i...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-10-02 07:52 UTC by Robert Frohl
Modified: 2019-10-08 06:43 UTC (History)
0 users

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2019-10-02 07:52:05 UTC
These features are new in 0.73 (released 2019-09-29):

    Security fix: on Windows, other applications were able to bind to the same TCP port as a PuTTY local port forwarding. (CVE-2019-17067)
    Security fix: in bracketed paste mode, the terminal escape sequences that should delimit the pasted data were appearing together on one side of it, making it possible to misidentify pasted data as manual keyboard input. (CVE-2019-17068)
    Bug fix (possibly security-related): an SSH-1 server sending a disconnection message could cause an access to freed memory. (CVE-2019-17069)
    Bug fix: Windows Plink would crash on startup if it was acting as a connection-sharing downstream.
    Bug fix: Windows PuTTY now updates its terminal window size correctly if the screen resolution changes while it's maximised.
    Bug fix: tweaked terminal handling to prevent lost characters at the ends of lines in gcc's coloured error messages.
    Bug fix: removed a bad interaction between the 'clear scrollback' operation and mouse selection that could give rise to the dreaded "line==NULL" assertion box. 


https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Comment 1 Swamp Workflow Management 2019-10-02 08:40:06 UTC
This is an autogenerated message for OBS integration:
This bug (1152753) was mentioned in
https://build.opensuse.org/request/show/734493 15.0 / putty
https://build.opensuse.org/request/show/734494 15.1 / putty
Comment 2 Swamp Workflow Management 2019-10-07 16:12:45 UTC
openSUSE-SU-2019:2277-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1152753
CVE References: CVE-2019-17068,CVE-2019-17069
Sources used:
openSUSE Leap 15.1 (src):    putty-0.73-lp151.3.6.1
Comment 3 Swamp Workflow Management 2019-10-07 16:14:06 UTC
openSUSE-SU-2019:2276-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1152753
CVE References: CVE-2019-17068,CVE-2019-17069
Sources used:
openSUSE Leap 15.0 (src):    putty-0.73-lp150.18.1
Comment 4 Swamp Workflow Management 2019-10-08 04:11:16 UTC
openSUSE-SU-2019:2292-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1152753
CVE References: CVE-2019-17068,CVE-2019-17069
Sources used:
openSUSE Backports SLE-15-SP1 (src):    putty-0.73-bp151.4.6.1
openSUSE Backports SLE-15 (src):    putty-0.73-bp150.4.12.1
Comment 5 Marcus Meissner 2019-10-08 06:12:41 UTC
done