./net/putty [SSH and telnet client]
[+] Add this package to your ports tracker

[ CVSweb ] [ Homepage ] [ RSS feed ]

Version: 0.69, Package name: putty-0.69
Maintained by: The OpenBSD ports mailing-list
Master sites:
Description-gui
PuTTY GUI SSH and telnet clients.

Description-main
PuTTY is a SSH and Telnet client implementation. This package contains
the command-line clients and supporting utilities for key generation.


Filesize: 2072.564 KB
Version History (View Complete History)
  • (2017-05-01) Updated to version: putty-0.69
  • (2016-03-05) Updated to version: putty-0.67
  • (2015-11-08) Updated to version: putty-0.66
  • (2015-09-13) Updated to version: putty-0.65
  • (2015-03-24) Updated to version: putty-0.64
  • (2013-08-07) Updated to version: putty-0.63
  • (2013-01-13) Updated to version: putty-0.62
  • (2007-09-04) Package added to openports.se, version putty-0.60 (created)
[show/hide] View available PLISTS (Can be a lot of data)

CVS Commit History:

   2017-05-01 14:26:59 by Stuart Henderson | Files touched by this commit (1)
Log message:
fix deps, moved to gtk+3
   2017-04-30 16:29:53 by Stuart Henderson | Files touched by this commit (4)
Log message:
update to PuTTY-0.69
disable new pageant build for now, doesn't build (setpgrp)
   2017-04-30 16:29:53 by Stuart Henderson | Files touched by this commit (4)
Log message:
update to PuTTY-0.69
disable new pageant build for now, doesn't build (setpgrp)
   2017-04-30 16:29:53 by Stuart Henderson | Files touched by this commit (4)
Log message:
update to PuTTY-0.69
disable new pageant build for now, doesn't build (setpgrp)
   2017-04-30 16:29:53 by Stuart Henderson | Files touched by this commit (4)
Log message:
update to PuTTY-0.69
disable new pageant build for now, doesn't build (setpgrp)
   2017-04-23 15:51:43 by Stuart Henderson | Files touched by this commit (1)
Log message:
force WARNINGOPTS in MAKE_FLAGS to disable -Werror
   2016-09-10 07:03:44 by Antoine Jacoutot | Files touched by this commit (95)
Log message:
First pass at pre-entively fixing ports that would break once guenther's header
pollution diff is in.
lang/squeak/vm does not build but it's due to the recent audio changes
games/xbattle: also fixes some conflicting implicit decl
print/hplip: also fixes some conflicting implicit decl
   2016-09-10 07:03:44 by Antoine Jacoutot | Files touched by this commit (95)
Log message:
First pass at pre-entively fixing ports that would break once guenther's header
pollution diff is in.
lang/squeak/vm does not build but it's due to the recent audio changes
games/xbattle: also fixes some conflicting implicit decl
print/hplip: also fixes some conflicting implicit decl
   2016-03-19 06:22:22 by Stuart Henderson | Files touched by this commit (1)
Log message:
MFC security update to PuTTY 0.67
This release fixes a security hole in PSCP, in the old-style SCP
protocol. A server sending a malformed header before the contents of the
file could overrun a buffer exploitably in PSCP. [CVE-2016-2563]
plus "Assorted other fixes for crash-type bugs (but none known to be
exploitable)".
   2016-03-05 05:58:20 by Stuart Henderson | Files touched by this commit (2)
Log message:
security update to PuTTY 0.67
This release fixes a security hole in PSCP, in the old-style SCP
protocol. A server sending a malformed header before the contents of the
file could overrun a buffer exploitably in PSCP. [CVE-2016-2563]
plus "Assorted other fixes for crash-type bugs (but none known to be
exploitable)".
   2016-03-05 05:58:20 by Stuart Henderson | Files touched by this commit (2)
Log message:
security update to PuTTY 0.67
This release fixes a security hole in PSCP, in the old-style SCP
protocol. A server sending a malformed header before the contents of the
file could overrun a buffer exploitably in PSCP. [CVE-2016-2563]
plus "Assorted other fixes for crash-type bugs (but none known to be
exploitable)".
   2015-11-07 10:46:41 by Stuart Henderson | Files touched by this commit (1)
Log message:
SECURITY update to PuTTY 0.66
"This release fixes a security hole in the terminal emulation code.
Writing a particular escape sequence to the screen in a PuTTY terminal
session could cause the terminal code to read *and potentially write*
memory outside its own data structures. This might be exploitable, so
everybody should upgrade to a fixed version."
   2015-11-07 10:46:06 by Stuart Henderson | Files touched by this commit (2)
Log message:
SECURITY update to PuTTY 0.66
"This release fixes a security hole in the terminal emulation code.
Writing a particular escape sequence to the screen in a PuTTY terminal
session could cause the terminal code to read *and potentially write*
memory outside its own data structures. This might be exploitable, so
everybody should upgrade to a fixed version."
   2015-11-07 10:46:06 by Stuart Henderson | Files touched by this commit (2)
Log message:
SECURITY update to PuTTY 0.66
"This release fixes a security hole in the terminal emulation code.
Writing a particular escape sequence to the screen in a PuTTY terminal
session could cause the terminal code to read *and potentially write*
memory outside its own data structures. This might be exploitable, so
everybody should upgrade to a fixed version."
   2015-09-12 14:22:35 by Stuart Henderson | Files touched by this commit (2)
Log message:
update to PuTTY-0.65
   2015-09-12 14:22:35 by Stuart Henderson | Files touched by this commit (2)
Log message:
update to PuTTY-0.65
   2015-03-25 05:48:39 by Jasper Lievisse Adriaanse | Files touched by this commit (2)
Log message:
Security fix for CVE-2015-2157, putty: failure to scrub private keys from memory after use
ok sthen@
   2015-03-25 05:48:39 by Jasper Lievisse Adriaanse | Files touched by this commit (2)
Log message:
Security fix for CVE-2015-2157, putty: failure to scrub private keys from memory after use
ok sthen@
   2015-03-25 05:48:28 by Jasper Lievisse Adriaanse | Files touched by this commit (2)
Log message:
Security fix for CVE-2015-2157, putty: failure to scrub private keys from memory after use
ok sthen@
   2015-03-25 05:48:28 by Jasper Lievisse Adriaanse | Files touched by this commit (2)
Log message:
Security fix for CVE-2015-2157, putty: failure to scrub private keys from memory after use
ok sthen@
   2015-03-24 10:43:48 by Stuart Henderson | Files touched by this commit (2)
Log message:
security update to PuTTY 0.64
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html
   2015-03-24 10:43:48 by Stuart Henderson | Files touched by this commit (2)
Log message:
security update to PuTTY 0.64
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html
   2011-07-06 17:56:08 by Antoine Jacoutot | Files touched by this commit (10)
Log message:
Use the libiconv|gettext MODULE.
   2010-11-19 15:31:39 by Marc Espie | Files touched by this commit (372)
Log message:
new depends
   2010-11-11 09:27:55 by Marc Espie | Files touched by this commit (46)
Log message:
new WANTLIB
   2010-10-18 12:37:00 by Marc Espie | Files touched by this commit (357)
Log message:
USE_GROFF=Yes
   2010-07-22 08:26:53 by Landry Breuil | Files touched by this commit (2)
Log message:
Make sure netinet/in.h is included before arpa/inet.h.
Fixes build with -Wsystem-headers.
   2010-07-22 08:26:53 by Landry Breuil | Files touched by this commit (2)
Log message:
Make sure netinet/in.h is included before arpa/inet.h.
Fixes build with -Wsystem-headers.
   2010-07-12 16:07:42 by Stuart Henderson | Files touched by this commit (244)
Log message:
use REVISION, checked with before/after make show=PKGNAMES (plus some
extra-careful checking where there are complicated PSEUDO_FLAVORS).
   2010-05-22 06:28:39 by Marc Espie | Files touched by this commit (1)
Log message:
silence warning for gcc4 (yes, the address is not null, no I don't fancy
changing the macro/code/whatever to fix that)
   2009-08-10 00:33:44 by Matthias Kilian | Files touched by this commit (52)
Log message:
WANTLIB changes after xcb addition and bump.