simon-git: putty-wishlist (main): Simon Tatham

Commits to Tartarus hosted VCS tartarus-commits at lists.tartarus.org
Thu Oct 9 08:40:41 BST 2025


TL;DR:
  dda946c Document this week's virus-checker slander.

Repository:     https://git.tartarus.org/simon/putty-wishlist.git
On the web:     https://git.tartarus.org/?p=simon/putty-wishlist.git
Branch updated: main
Committer:      Simon Tatham <anakin at pobox.com>
Date:           2025-10-09 08:40:41

commit dda946c22ba49311f44f467eb14d0a79bed9be0b
web diff https://git.tartarus.org/?p=simon/putty-wishlist.git;a=commitdiff;h=dda946c22ba49311f44f467eb14d0a79bed9be0b;hp=b67a1667974705d9d2eab1824e709ce48dc80c4d
Author: Simon Tatham <anakin at pobox.com>
Date:   Thu Oct 9 08:38:30 2025 +0100

    Document this week's virus-checker slander.
    
    Haven't had a lot of these recently, or maybe we just haven't been
    reliable at adding them to the page. But a user reported that ClamAV
    had started claiming this week that the 0.83 x86-64 putty.exe is
    Win.Exploit.Marte-10058127-0.
    
    This time ClamAV's database entry isn't based on a hash of putty.exe's
    code section. Instead it's based on specific strings in the binary –
    and the strings in question are pathnames of PuTTY source files baked
    into the binary at build time, including a mkstemp(3)-derived path
    name that specifically identifies the 0.83 official build.

 data/false-positive-malware | 5 +++++
 1 file changed, 5 insertions(+)



More information about the tartarus-commits mailing list