./net/putty [SSH and telnet client]
[+] Add this package to your ports tracker

[ CVSweb ] [ Homepage ] [ RSS feed ]

Version: 0.77, Package name: putty-0.77
Maintained by: The OpenBSD ports mailing-list
Master sites:
Description-gui
PuTTY GUI SSH and telnet clients.

Description-main
PuTTY is a SSH and Telnet client implementation. This package contains
the command-line clients and supporting utilities for key generation.


Filesize: 2558.087 KB
Version History (View Complete History)
  • (2022-05-27) Updated to version: putty-0.77
  • (2021-07-17) Updated to version: putty-0.76
  • (2021-05-08) Updated to version: putty-0.75
  • (2020-06-27) Updated to version: putty-0.74
  • (2019-09-30) Updated to version: putty-0.73
  • (2019-07-20) Updated to version: putty-0.72
  • (2019-03-31) Updated to version: putty-0.71
  • (2017-05-01) Updated to version: putty-0.69
  • (2016-03-05) Updated to version: putty-0.67
  • (2015-11-08) Updated to version: putty-0.66
[show/hide] View available PLISTS (Can be a lot of data)

CVS Commit History:

   2021-07-17 06:01:54 by Stuart Henderson | Files touched by this commit (3)
Log message:
update to putty-0.76, mostly fixes but an interesting new optional
feature "Disconnect if authentication succeeds trivially", more
information in the new text for 2021-07-17 at the bottom of
https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-auth-prompt-spoofing.html
   2021-05-09 01:48:42 by Stuart Henderson | Files touched by this commit (1)
Log message:
missed cvs rm; reported by aja@
   2021-05-08 04:26:22 by Stuart Henderson | Files touched by this commit (5)
Log message:
update to PuTTY-0.75, changes include:
- private key format has been udpated and now uses Argon2
- new algorithms; Curve448 kex, Ed448 pub keys, SHA-2 RSA variants
- pageant permits loading an encrypted private key and only giving the
passphrase later when it's used
https://lists.tartarus.org/pipermail/putty-announce/2021/000031.html
   2020-06-27 05:56:27 by Stuart Henderson | Files touched by this commit (2)
Log message:
update to PuTTY 0.74
- In some situations an SSH server could cause PuTTY to access freed
memory by pretending to accept an SSH key and then refusing the
actual signature. It can only happen if you're using an SSH agent.
- New configuration option to disable PuTTY's default policy of
changing its host key algorithm preferences to prefer keys it
already knows. (There is a theoretical information leak in this
policy.)
   2020-06-27 05:56:19 by Stuart Henderson | Files touched by this commit (3)
Log message:
update to PuTTY 0.74
- In some situations an SSH server could cause PuTTY to access freed
memory by pretending to accept an SSH key and then refusing the
actual signature. It can only happen if you're using an SSH agent.
- New configuration option to disable PuTTY's default policy of
changing its host key algorithm preferences to prefer keys it
already knows. (There is a theoretical information leak in this
policy.)
   2019-09-30 02:45:39 by Stuart Henderson | Files touched by this commit (3)
Log message:
security update to PuTTY 0.73
"This is a SECURITY UPDATE, fixing minor vulnerabilities affecting port
forwarding on Windows; bracketed paste mode in the terminal; and any
use of SSH-1. We recommend that anyone using those features should
update."
   2019-07-20 05:55:25 by Stuart Henderson | Files touched by this commit (7)
Log message:
update to PuTTY 0.72, "fixes a small number of further security issues
found by the 2019 EU-funded HackerOne bug bounty, and a variety of other
bugs introduced in 0.71"
   2019-07-12 14:49:09 by Stuart Henderson | Files touched by this commit (854)
Log message:
replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes
   2019-07-04 09:39:32 by Stuart Henderson | Files touched by this commit (1)
Log message:
use autoreconf in net/putty for a tidier Makefile
   2019-05-20 16:15:31 by Christian Weisgerber | Files touched by this commit (488)
Log message:
Update gettext to 0.20.1.
Follow the upstream recommendations for packagers and switch to
multi-packages:
devel/gettext       -> devel/gettext,-runtime
devel/gettext-tools -> devel/gettext,-tools
(new)                  devel/gettext,-textstyle
   2019-05-17 09:39:59 by Stuart Henderson | Files touched by this commit (3)
Log message:
net/putty packaging change: move pageant to gui, it's linked against X11 libs.
add a comment in case this can be moved back in a future update.
   2019-03-31 04:55:48 by Stuart Henderson | Files touched by this commit (5)
Log message:
add putty patches: pageant fix from freebsd, arm/aarch64 fix from upstream
   2019-03-16 16:09:30 by Stuart Henderson | Files touched by this commit (5)
Log message:
udpate to PuTTY 0.71
   2019-01-17 03:13:40 by Anthony J. Bentley | Files touched by this commit (4)
Log message:
HTTPS for chiark.greenend.org.uk.
   2017-05-01 14:26:59 by Stuart Henderson | Files touched by this commit (1)
Log message:
fix deps, moved to gtk+3
   2017-04-30 16:29:53 by Stuart Henderson | Files touched by this commit (4)
Log message:
update to PuTTY-0.69
disable new pageant build for now, doesn't build (setpgrp)
   2017-04-23 15:51:43 by Stuart Henderson | Files touched by this commit (1)
Log message:
force WARNINGOPTS in MAKE_FLAGS to disable -Werror
   2016-09-10 07:03:44 by Antoine Jacoutot | Files touched by this commit (95)
Log message:
First pass at pre-entively fixing ports that would break once guenther's header
pollution diff is in.
lang/squeak/vm does not build but it's due to the recent audio changes
games/xbattle: also fixes some conflicting implicit decl
print/hplip: also fixes some conflicting implicit decl
   2016-03-19 06:22:22 by Stuart Henderson | Files touched by this commit (1)
Log message:
MFC security update to PuTTY 0.67
This release fixes a security hole in PSCP, in the old-style SCP
protocol. A server sending a malformed header before the contents of the
file could overrun a buffer exploitably in PSCP. [CVE-2016-2563]
plus "Assorted other fixes for crash-type bugs (but none known to be
exploitable)".
   2016-03-05 05:58:20 by Stuart Henderson | Files touched by this commit (2)
Log message:
security update to PuTTY 0.67
This release fixes a security hole in PSCP, in the old-style SCP
protocol. A server sending a malformed header before the contents of the
file could overrun a buffer exploitably in PSCP. [CVE-2016-2563]
plus "Assorted other fixes for crash-type bugs (but none known to be
exploitable)".
   2015-11-07 10:46:41 by Stuart Henderson | Files touched by this commit (1)
Log message:
SECURITY update to PuTTY 0.66
"This release fixes a security hole in the terminal emulation code.
Writing a particular escape sequence to the screen in a PuTTY terminal
session could cause the terminal code to read *and potentially write*
memory outside its own data structures. This might be exploitable, so
everybody should upgrade to a fixed version."
   2015-11-07 10:46:06 by Stuart Henderson | Files touched by this commit (2)
Log message:
SECURITY update to PuTTY 0.66
"This release fixes a security hole in the terminal emulation code.
Writing a particular escape sequence to the screen in a PuTTY terminal
session could cause the terminal code to read *and potentially write*
memory outside its own data structures. This might be exploitable, so
everybody should upgrade to a fixed version."
   2015-09-12 14:22:35 by Stuart Henderson | Files touched by this commit (2)
Log message:
update to PuTTY-0.65
   2015-03-25 05:48:39 by Jasper Lievisse Adriaanse | Files touched by this commit (2)
Log message:
Security fix for CVE-2015-2157, putty: failure to scrub private keys from memory after use
ok sthen@
   2015-03-25 05:48:28 by Jasper Lievisse Adriaanse | Files touched by this commit (2)
Log message:
Security fix for CVE-2015-2157, putty: failure to scrub private keys from memory after use
ok sthen@
   2015-03-24 10:43:48 by Stuart Henderson | Files touched by this commit (2)
Log message:
security update to PuTTY 0.64
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html
   2011-07-06 17:56:08 by Antoine Jacoutot | Files touched by this commit (10)
Log message:
Use the libiconv|gettext MODULE.
   2010-11-19 15:31:39 by Marc Espie | Files touched by this commit (372)
Log message:
new depends
   2010-11-11 09:27:55 by Marc Espie | Files touched by this commit (46)
Log message:
new WANTLIB
   2010-10-18 12:37:00 by Marc Espie | Files touched by this commit (357)
Log message:
USE_GROFF=Yes
   2010-07-22 08:26:53 by Landry Breuil | Files touched by this commit (2)
Log message:
Make sure netinet/in.h is included before arpa/inet.h.
Fixes build with -Wsystem-headers.
   2010-07-12 16:07:42 by Stuart Henderson | Files touched by this commit (244)
Log message:
use REVISION, checked with before/after make show=PKGNAMES (plus some
extra-careful checking where there are complicated PSEUDO_FLAVORS).
   2010-05-22 06:28:39 by Marc Espie | Files touched by this commit (1)
Log message:
silence warning for gcc4 (yes, the address is not null, no I don't fancy
changing the macro/code/whatever to fix that)
   2009-08-10 00:33:44 by Matthias Kilian | Files touched by this commit (52)
Log message:
WANTLIB changes after xcb addition and bump.