<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Update Putty</title>
	<atom:link href="http://www.epanorama.net/blog/2019/03/21/update-putty/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/03/21/update-putty/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 03 Apr 2026 21:03:02 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/03/21/update-putty/comment-page-1/#comment-1630487</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 22 Mar 2019 09:09:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182005#comment-1630487</guid>
		<description><![CDATA[Multiple Vulnerabilities Patched in PuTTY and LibSSH2
https://www.securityweek.com/multiple-vulnerabilities-patched-putty-and-libssh2

PuTTY, an SSH and Telnet client program, and LibSSH2, a client-side C library for the SSH2 protocol, have both received updates fixing multiple vulnerabilities. Eight vulnerabilities have been fixed in version 0.71 of PuTTY, and nine vulnerabilities fixed in version 1.8.1 of LibSSH2.

Seven of the eight PuTTY vulnerabilities were found through the auspices of the EU-FOSSA bug bounty project being operated through HackerOne and Intigriti/Deloitte. 

The PuTTY scheme runs from 7 January 2019 until 15 December 2019. Its total available bounty is €90,000, which is the highest single amount in the scheme.

Three of the eight PuTTY vulnerabilities allow DoS attacks against it. The three conditions are, if a CJK wide character is written to a 1-column-wide terminal; combining characters, double-width text, an odd number of terminal columns, and GTK; and if many Unicode combining characters are written to the terminal.]]></description>
		<content:encoded><![CDATA[<p>Multiple Vulnerabilities Patched in PuTTY and LibSSH2<br />
<a href="https://www.securityweek.com/multiple-vulnerabilities-patched-putty-and-libssh2" rel="nofollow">https://www.securityweek.com/multiple-vulnerabilities-patched-putty-and-libssh2</a></p>
<p>PuTTY, an SSH and Telnet client program, and LibSSH2, a client-side C library for the SSH2 protocol, have both received updates fixing multiple vulnerabilities. Eight vulnerabilities have been fixed in version 0.71 of PuTTY, and nine vulnerabilities fixed in version 1.8.1 of LibSSH2.</p>
<p>Seven of the eight PuTTY vulnerabilities were found through the auspices of the EU-FOSSA bug bounty project being operated through HackerOne and Intigriti/Deloitte. </p>
<p>The PuTTY scheme runs from 7 January 2019 until 15 December 2019. Its total available bounty is €90,000, which is the highest single amount in the scheme.</p>
<p>Three of the eight PuTTY vulnerabilities allow DoS attacks against it. The three conditions are, if a CJK wide character is written to a 1-column-wide terminal; combining characters, double-width text, an odd number of terminal columns, and GTK; and if many Unicode combining characters are written to the terminal.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
