simon-git: putty-wishlist (main): Simon Tatham
Commits to Tartarus hosted VCS
tartarus-commits at lists.tartarus.org
Thu Oct 9 08:40:41 BST 2025
TL;DR:
dda946c Document this week's virus-checker slander.
Repository: https://git.tartarus.org/simon/putty-wishlist.git
On the web: https://git.tartarus.org/?p=simon/putty-wishlist.git
Branch updated: main
Committer: Simon Tatham <anakin at pobox.com>
Date: 2025-10-09 08:40:41
commit dda946c22ba49311f44f467eb14d0a79bed9be0b
web diff https://git.tartarus.org/?p=simon/putty-wishlist.git;a=commitdiff;h=dda946c22ba49311f44f467eb14d0a79bed9be0b;hp=b67a1667974705d9d2eab1824e709ce48dc80c4d
Author: Simon Tatham <anakin at pobox.com>
Date: Thu Oct 9 08:38:30 2025 +0100
Document this week's virus-checker slander.
Haven't had a lot of these recently, or maybe we just haven't been
reliable at adding them to the page. But a user reported that ClamAV
had started claiming this week that the 0.83 x86-64 putty.exe is
Win.Exploit.Marte-10058127-0.
This time ClamAV's database entry isn't based on a hash of putty.exe's
code section. Instead it's based on specific strings in the binary â
and the strings in question are pathnames of PuTTY source files baked
into the binary at build time, including a mkstemp(3)-derived path
name that specifically identifies the 0.83 official build.
data/false-positive-malware | 5 +++++
1 file changed, 5 insertions(+)
More information about the tartarus-commits
mailing list