Your submission was sent successfully! Close

CVE-2015-2157

Published: 27 March 2015

The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Priority

Low

Status

Package Release Status
putty
Launchpad, Ubuntu, Debian
Upstream
Released (0.63-10)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(0.64-1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [0.63-4ubuntu0.1])