Security vulnerabilities in Putty prior to 0.71

Bug #1821407 reported by Hunter Buchanan
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
putty (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

Putty 0.71 was released, patching major security vulnerabilities present in previous versions. Vulnerabilities are laid out in the following CVE reports, ranging in severity from High to Critical:

CVE-2019-9898 Potential recycling of random numbers used in cryptography exists within PuTTY before 0.71.
CVE-2019-9897 Multiple denial-of-service attacks that can be triggered by writing to the terminal exist in PuTTY versions before 0.71.
CVE-2019-9895 In PuTTY versions before 0.71 on Unix, a remotely triggerable buffer overflow exists in any kind of server-to-client forwarding.
CVE-2019-9894 A remotely triggerable memory overwrite in RSA key exchange in PuTTY before 0.71 can occur before host key verification.

Threats can be mitigated by providing Putty 0.71 to Ubuntu via Apt on Disco, Cosmic, Bionic, and Xenial, if not others.

information type: Private Security → Public Security
Revision history for this message
Hunter Buchanan (hrbuchanan) wrote :

Tried to link CVEs to the bug report but the database hasn't been pulled recently enough. Will try again later today or tomorrow.

tags: added: bionic
tags: added: cosmic disco xenial
Revision history for this message
Seth Arnold (seth-arnold) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

tags: added: community-security
Revision history for this message
Seth Arnold (seth-arnold) wrote :

The launchpad cve integration was a nice idea but never really grew into anything.

The Ubuntu security team tracks CVEs through a different database, eg:

https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9898.html

You can see the CVEs that we know about for Putty via:

https://people.canonical.com/~ubuntu-security/cve/pkg/putty.html

If you're in a position to prepare updates for universe, please take into account all the known CVEs, not just the most recent ones.

Thanks

Revision history for this message
Colin Watson (cjwatson) wrote :

This is in progress - I've been working on getting backports in place in Debian, and Ubuntu should mostly be able to use the same patches.

Revision history for this message
Colin Watson (cjwatson) wrote :

Though for clarity, we won't be backporting 0.71 wholesale, but rather applying cherry-picked security updates. I've been consulting with upstream on this.

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package putty - 0.67-3+deb9u1build0.16.04.1

---------------
putty (0.67-3+deb9u1build0.16.04.1) xenial-security; urgency=medium

  * fake sync from Debian (LP: #1821407)

putty (0.67-3+deb9u1) stretch-security; urgency=high

  * Backport security fixes from 0.71:
    - In random_add_noise, put the hashed noise into the pool, not the raw
      noise.
    - New facility for removing pending toplevel callbacks.
    - CVE-2019-9898: Fix one-byte buffer overrun in random_add_noise().
    - uxnet: clean up callbacks when closing a NetSocket.
    - sk_tcp_close: fix memory leak of output bufchain.
    - Fix handling of bad RSA key with n=p=q=0.
    - Sanity-check the 'Public-Lines' field in ppk files.
    - Introduce an enum of the uxsel / select_result flags.
    - CVE-2019-9895: Switch to using poll(2) in place of select(2).
    - CVE-2019-9894: RSA kex: enforce the minimum key length.
    - CVE-2019-9897: Fix crash on ESC#6 + combining chars + GTK + odd-width
      terminal.
    - CVE-2019-9897: Limit the number of combining chars per terminal cell.
    - minibidi: fix read past end of line in rule W5.
    - CVE-2019-9897: Fix crash printing a width-2 char in a width-1
      terminal.

 -- Steve Beattie <email address hidden> Tue, 21 May 2019 10:43:51 -0700

Changed in putty (Ubuntu):
status: New → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.