PuTTY 0.69 is released
Simon Tatham
anakin at pobox.com
Sat Apr 29 10:28:41 BST 2017
PuTTY version 0.69 is released
------------------------------
All the pre-built binaries, and the source code, are now available
from the PuTTY website at
http://www.chiark.greenend.org.uk/~sgtatham/putty/
There is one SECURITY FIX in this release:
- Fixed further instances of Windows DLL hijacking. 0.68 fixed many
of these, but could still be hijacked by DLLs in the same directory
as its executable file with names WINMM.DLL, WINSPOOL.DRV,
BCRYPT.DLL and (in some circumstances) SSPICLI.DLL. 0.69 should now
be safe against those attacks, as well as the ones 0.68 prevented.
Other than that, 0.69 just fixes a few bugs in the 0.68 feature release:
- PuTTY's use of the MIT Kerberos DLL stopped working on Windows, as
a side effect of the previous round of DLL hijacking protection. It
should work again now.
- The Windows Start Menu shortcut for PuTTY had stopped displaying
the jump list of recently used sessions. It should work again now
(though we think there's still at least one remaining problem with
jump lists).
- Fixed a bug in which SSH terminal modes were being sent even if you
didn't want them to be, which could have confused some SSH servers.
- Unix: improved compatibility with up-to-date versions of GTK 3.
- Fixed a corner-case bug in Poly1305 modular reduction.
Enjoy using PuTTY!
Cheers,
Simon
--
import hashlib; print (lambda p,q,g,y,r,s,m: m if (lambda w:(pow(g,int(hashlib.
sha1(m).hexdigest(),16)*w%q,p)*pow(y,r*w%q,p)%p)%q)(pow(s,q-2,q))==r else "!"
)(0xb80b5dacabab6145, 0xf70027d345023, 0x7643bc4018957897, 0x11c2e5d9951130c9,
0xa54d9cbe4e8ab, 0x746c50eaa1910, "Simon Tatham <anakin at pobox.com>")
More information about the PuTTY-announce
mailing list