Summary: | <net-misc/putty-0.62 - Wipe SSH keyboard-interactive replies from memory after authentication. (CVE-2011-4607) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Jeroen Roovers (RETIRED) <jer> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/password-not-wiped.html | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Jeroen Roovers (RETIRED)
![]() Arch teams, please test and mark stable: =net-misc/putty-0.62 Target KEYWORDS="alpha amd64 ppc sparc x86" Stable for AMD64 alpha/sparc/x86 stable ppc done; closing as last arch @security: please vote Thanks, everyone. GLSA Vote: yes. Vote: NO. Vote: Yes. Created new GLSA request. This issue was resolved and addressed in GLSA 201308-01 at http://security.gentoo.org/glsa/glsa-201308-01.xml by GLSA coordinator Sergey Popov (pinkbyte). CVE-2011-4607 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4607): PuTTY 0.59 through 0.61 does not clear sensitive process memory when managing user replies that occur during keyboard-interactive authentication, which might allow local users to read login passwords by obtaining access to the process' memory. |