-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : putty Version : 0.63-10+deb8u2 CVE ID : CVE-2019-9894 CVE-2019-9897 CVE-2019-9898
Multiple vulnerabilities were found in the PuTTY SSH client, which could result in denial of service and potentially the execution of arbitrary code. In addition, in some situations random numbers could potentially be re-used.
For Debian 8 "Jessie", these problems have been fixed in version 0.63-10+deb8u2.
We recommend that you upgrade your putty packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAlzA1GJfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7 WEcDqQ/7BHMy+27FjnyFjmEvyUUgnAkRTtolyuFnaRTy1jsYLy9LUFW5le75X1Q1 fGF5OxGOOYXWcM3FREA3lX4pQvxW4KNbh5vZstjMzM41Pf1XeSFUqYZx31d0opJu BBo0mAm5OXcH5AbRuJh2o0uQgO5LMmEewqXfoutcCJLt7vzUqTujaDUV6ZeXIhcz /6JOjmpphGv9L3a7RCD/VWCkg3jkgZkk65tvvhlaJbw+a12bxz3RfUwyq5mf9oCu JaDbKqbFXkXw0lJelD3Ne7M3RfJxyL+GdoSUUZiOtGIBjNBXPGDUI0VYBin9gMu0 LUrJgwbROYvllI9s87lb/tk5AEUCX6HdKYhVhWZGT4rL7guBIj/YlIw3TwFQsH40 AS3OdQie2z73ip4lp9PnWdXsYI+YV3bs8X1V0juPQvOQ2zrJH1Q2uE4mgcFHtTkK bBl7HazIcauBzF3vgAqH/EN7IIuEcdN9J6LCqpd+T3R/1Oiy/Aai4HnCQnkI84qP SiXDIMIpoi9VifJTHaljzib27NjHrozY8dWFgMLF/6yfMksEbbrw9j1T/qYe08AH Glg5WzO5dicIP1oOLpUYAFYlVqYbLT6BgqqHGy+l7RA9RyYd2X9ep6TlWKo2S9YD H8nMag0zk3CpHpFjNp68pPe725ilOiQo9nR+ZxhhaeCfU01p8CI= =L9L0 -----END PGP SIGNATURE-----
