1
Candidate: CVE-2011-4607
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4607
5
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/password-not-wiped.html
7
PuTTY 0.59 through 0.61 does not clear sensitive process memory when
8
managing user replies that occur during keyboard-interactive
9
authentication, which might allow local users to read login passwords by
10
obtaining access to the process' memory.
14
https://bugzilla.redhat.com/show_bug.cgi?id=766865
15
http://bugs.gentoo.org/show_bug.cgi?id=394429
21
upstream: http://svn.tartarus.org/sgt?view=rev&revision=9357
22
upstream_putty: released (0.62)
23
hardy_putty: ignored (reached end-of-life)
24
lucid_putty: ignored (reached end-of-life)
25
maverick_putty: ignored (reached end-of-life)
26
natty_putty: ignored (reached end-of-life)
27
oneiric_putty: ignored (reached end-of-life)
28
precise_putty: not-affected (0.62-1ubuntu1)
29
quantal_putty: not-affected (0.62-1ubuntu1)
30
raring_putty: not-affected (0.62-1ubuntu1)
31
devel_putty: not-affected (0.62-1ubuntu1)