[SECURITY] [DLA 3839-1] putty security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3839-1 [email protected]
https://www.debian.org/lts/security/ Bastien Roucariès
June 20, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : putty
Version : 0.74-1+deb11u1~deb10u2
CVE ID : CVE-2024-31497
A biased ECDSA nonce generation allowed an attacker
to recover a user's NIST P-521 secret key via a quick attack in
approximately 60 signatures. In other words, an adversary
may already have enough signature information to compromise a victim's
private key, even if there is no further use of vulnerable PuTTY
versions.
This allowed an attacker to (for instance) log in to any servers
the victim uses that key for.
To obtain these signatures, an attacker need only briefly compromise
any server the victim uses the key to authenticate to.
Therefore, if you have any NIST-P521 ECDSA key, we strongly recommend
you to replace it with a freshly new created with a fixed version of
putty. Then, to revoke the old public key and remove it from any
machine where you use it to login into, so that a signature
from the compromised key has no value any more.
The only affected key type is 521-bit ECDSA. That is, a key that appears
in Windows PuTTYgen with ecdsa-sha2-nistp521 at the start of the
'Key fingerprint' box, or is described as 'NIST p521', or has an id
starting ecdsa-sha2-nistp521 in the SSH protocol or the key file.
Other sizes of ECDSA, and other key algorithms, are unaffected.
In particular, Ed25519 is not affected.
For Debian 10 buster, this problem has been fixed in version
0.74-1+deb11u1~deb10u2.
We recommend that you upgrade your putty packages.
For the detailed security status of putty please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/putty
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=knh0
-----END PGP SIGNATURE-----
Reply to: