[go: up one dir, main page]

|
|
Log in / Subscribe / Register

Debian alert DLA-3839-1 (putty)

From:  rouca@debian.org
To:  <debian-lts-announce@lists.debian.org>
Subject:  [SECURITY] [DLA 3839-1] putty security update
Date:  Thu, 20 Jun 2024 18:20:11 +0000
Message-ID:  <c075f4845bb9fb96e0bbef2b0e94c453.rouca@debian.org>

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3839-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Bastien Roucariès June 20, 2024 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : putty Version : 0.74-1+deb11u1~deb10u2 CVE ID : CVE-2024-31497 A biased ECDSA nonce generation allowed an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. In other words, an adversary may already have enough signature information to compromise a victim's private key, even if there is no further use of vulnerable PuTTY versions. This allowed an attacker to (for instance) log in to any servers the victim uses that key for. To obtain these signatures, an attacker need only briefly compromise any server the victim uses the key to authenticate to. Therefore, if you have any NIST-P521 ECDSA key, we strongly recommend you to replace it with a freshly new created with a fixed version of putty. Then, to revoke the old public key and remove it from any machine where you use it to login into, so that a signature from the compromised key has no value any more. The only affected key type is 521-bit ECDSA. That is, a key that appears in Windows PuTTYgen with ecdsa-sha2-nistp521 at the start of the 'Key fingerprint' box, or is described as 'NIST p521', or has an id starting ecdsa-sha2-nistp521 in the SSH protocol or the key file. Other sizes of ECDSA, and other key algorithms, are unaffected. In particular, Ed25519 is not affected. For Debian 10 buster, this problem has been fixed in version 0.74-1+deb11u1~deb10u2. We recommend that you upgrade your putty packages. For the detailed security status of putty please refer to its security tracker page at: https://security-tracker.debian.org/tracker/putty Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQJFBAEBCgAvFiEEXQGHuUCiRbrXsPVqADoaLapBCF8FAmZ0ctMRHHJvdWNhQGRl Ymlhbi5vcmcACgkQADoaLapBCF8UWBAAsgauZqayhC7nOSVTeN41W90cGueQGbrp zo7XCIOy6PGuuetEFFLD6+fkQ3OZTz4R9xbVeA1Zpb9OvB3Tj7Xf0N5FdLp26xQv BweENq+BEOyOEC+4vxQ5rRBWKTVoiS/sbzT1PeTxYdIXdwWsgxJuEi0akMqeA7Wf re4CcWl4cPd5TjrfL6hddyniQpqA159Ff+1d/mA1BTtDGRT24N0D95twUNFx+0We HIrcq8rflYwPBEM5OX0MUkyb3BNNUzw9TuMICU9atVAjoJd1Z8yp2OPZU/bR/ckr 4AnHSdNFhlFEKNvt2EMrSXx558fmeY3iRnuw5q4axuU3cQ3+otvdh6eDKwexys7S HKPI8mHIhssjKl5pCC6otzl8BhAsdqhygvcNcQygwI07U5+VjdvYjCSrJ0DdpPWa 2DFzXOa9Rr8KoWMNU7SXIH2w35Hu155jxIvbfGVb7foQeW52C9Pqe9cQka5MB0+j tN25CpVG7cov189jBNwCEbeOvm1W3iI8Ysgf2WxZ/mZvYok70My9ec3nS36Dovsl 3D6yM/TtozfxBP+eh9IybFq7PG7izbqZPtm8S9P1pTT5h6memJ4aySZtFjumZPFo eqyK4P1ePqbFqsrwxT6lTPGJwm/GqxWwTHBnLp/bVTmA385ag806Li+TZueDaYSI /kTxT4zZryc= =knh0 -----END PGP SIGNATURE-----


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds