70455e092e
The only change between 0.80 and 0.81 is one security fix:
- ECDSA signatures using 521-bit keys (the NIST P521 curve, otherwise
known as ecdsa-sha2-nistp521) were generated with biased random
numbers. This permits an attacker in possession of a few dozen
signatures to RECOVER THE PRIVATE KEY.
Any 521-bit ECDSA private key that PuTTY or Pageant has used to
sign anything should be considered compromised.
This vulnerability has the identifier CVE-2024-31497.
Update hash of LICENCE file (update in year with
https://git.tartarus.org/?p=simon/putty.git;a=commit;h=f2f28ac0386eebbd45ea605818d31d62d219f589)
https://lists.tartarus.org/pipermail/putty-announce/2024/000038.html
Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit
|
||
---|---|---|
.. | ||
0001-unix-utils-arm_arch_queries.h-fix-uclibc-build.patch | ||
Config.in | ||
putty.hash | ||
putty.mk |