PuTTY 0.69 is released

Simon Tatham anakin at pobox.com
Sat Apr 29 10:28:41 BST 2017


PuTTY version 0.69 is released
------------------------------

All the pre-built binaries, and the source code, are now available
from the PuTTY website at

    http://www.chiark.greenend.org.uk/~sgtatham/putty/

There is one SECURITY FIX in this release:

 - Fixed further instances of Windows DLL hijacking. 0.68 fixed many
   of these, but could still be hijacked by DLLs in the same directory
   as its executable file with names WINMM.DLL, WINSPOOL.DRV,
   BCRYPT.DLL and (in some circumstances) SSPICLI.DLL. 0.69 should now
   be safe against those attacks, as well as the ones 0.68 prevented.

Other than that, 0.69 just fixes a few bugs in the 0.68 feature release:

 - PuTTY's use of the MIT Kerberos DLL stopped working on Windows, as
   a side effect of the previous round of DLL hijacking protection. It
   should work again now.

 - The Windows Start Menu shortcut for PuTTY had stopped displaying
   the jump list of recently used sessions. It should work again now
   (though we think there's still at least one remaining problem with
   jump lists).

 - Fixed a bug in which SSH terminal modes were being sent even if you
   didn't want them to be, which could have confused some SSH servers.

 - Unix: improved compatibility with up-to-date versions of GTK 3.

 - Fixed a corner-case bug in Poly1305 modular reduction.

Enjoy using PuTTY!

Cheers,
Simon

-- 
import hashlib; print (lambda p,q,g,y,r,s,m: m if (lambda w:(pow(g,int(hashlib.
 sha1(m).hexdigest(),16)*w%q,p)*pow(y,r*w%q,p)%p)%q)(pow(s,q-2,q))==r else "!"
 )(0xb80b5dacabab6145, 0xf70027d345023, 0x7643bc4018957897, 0x11c2e5d9951130c9,
 0xa54d9cbe4e8ab, 0x746c50eaa1910, "Simon Tatham <anakin at pobox.com>")



More information about the PuTTY-announce mailing list