--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2024-79f96e9d05
2024-04-26 01:03:55.836232
--------------------------------------------------------------------------------
Name : putty
Product : Fedora EPEL 9
Version : 0.81
Release : 1.el9
URL :
http://www.chiark.greenend.org.uk/~sgtatham/putty/
Summary : SSH, Telnet and Rlogin client
Description :
Putty is a SSH, Telnet & Rlogin client - this time for Linux.
--------------------------------------------------------------------------------
Update Information:
Security fix for CVE-2024-31497.
--------------------------------------------------------------------------------
ChangeLog:
* Wed Apr 17 2024 Jaroslav ��karvada <jskarvad(a)redhat.com> - 0.81-1
- New version
Resolves: rhbz#2275179
- Fixed vulnerability allowing recovery of NIST P-521 private keys
Resolves: CVE-2024-31497
* Fri Jan 26 2024 Fedora Release Engineering <releng(a)fedoraproject.org> - 0.80-3
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Sun Jan 21 2024 Fedora Release Engineering <releng(a)fedoraproject.org> - 0.80-2
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2275183 - CVE-2024-31497 putty: secret key recovery of NIST P-521 private
keys through biased ECDSA nonces in putty client
https://bugzilla.redhat.com/show_bug.cgi?id=2275183
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update putty' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7\
/html/System_Administrators_Guide/ch-yum.html
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------