notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Hardware failure

The website is running on the old server. The new server stopped working at about 0200 UTC on 2020-08-22. The database was restored from 2020-08-21 00:59:15+00 UTC. We think we have covered all commits. Nothing should be missing. Any changes you made to your accounts after the restore date will be lost. Sorry about that.
Port details
putty Secure shell and telnet client
0.74_1 security on this many watch lists=23 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. 0.74_1Version of this port present on the latest quarterly branch.
Maintainer: mandree@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2004-02-13 17:46:26
Last Update: 2020-07-01 23:14:45
SVN Revision: 540995

People watching this port, also watch: firefox, nmap, zip, curl, mplayer

License: MIT
Description:
SVNWeb : Homepage
pkg-plist: as obtained via: make generate-plist
Expand this list (20 items)
Collapse this list.
  1. bin/plink
  2. bin/pscp
  3. bin/psftp
  4. bin/puttygen
  5. man/man1/plink.1.gz
  6. man/man1/pscp.1.gz
  7. man/man1/psftp.1.gz
  8. man/man1/puttygen.1.gz
  9. bin/pageant
  10. bin/pterm
  11. bin/putty
  12. bin/puttytel
  13. man/man1/pageant.1.gz
  14. man/man1/pterm.1.gz
  15. man/man1/putty.1.gz
  16. man/man1/puttytel.1.gz
  17. share/pixmaps/putty.ico
  18. /usr/local/share/licenses/putty-0.74_1/catalog.mk
  19. /usr/local/share/licenses/putty-0.74_1/LICENSE
  20. /usr/local/share/licenses/putty-0.74_1/MIT
Collapse this list.
Dependency lines:
  • putty>0:security/putty
Conflicts:
CONFLICTS_INSTALL:
  • pssh-[0-9]*
  • putty-gtk2-[0-9]*
  • putty-nogtk-[0-9]*
Conflicts Matches:
There are no Conflicts Matches for this port. This is usually an error.
To install the port: cd /usr/ports/security/putty/ && make install clean
To add the package: pkg install putty
PKGNAME: putty
Flavors: there is no flavor information for this port.
distinfo:
Packages: (move your mouse over the cells for more information)
putty
ABIlatestquarterly
FreeBSD:11:aarch640.700.74_1
FreeBSD:11:amd640.74_10.74_1
FreeBSD:11:armv60.670.74_1
FreeBSD:11:i3860.74_10.74_1
FreeBSD:11:mips--
FreeBSD:11:mips64--
FreeBSD:12:aarch640.700.74_1
FreeBSD:12:amd640.74_10.74_1
FreeBSD:12:armv60.70-
FreeBSD:12:armv70.70-
FreeBSD:12:i3860.74_10.74_1
FreeBSD:12:mips--
FreeBSD:12:mips64--
FreeBSD:12:powerpc64--
FreeBSD:13:aarch640.74_1-
FreeBSD:13:amd640.74_1-
FreeBSD:13:armv6--
FreeBSD:13:armv7--
FreeBSD:13:i3860.74_1-
FreeBSD:13:mips--
FreeBSD:13:mips64--
FreeBSD:13:powerpc640.74_1-
 

Slave ports
  1. security/putty-gtk2
  2. security/putty-nogtk

Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. gmake>=4.3 : devel/gmake
  2. pkgconf>=1.3.0_1 : devel/pkgconf
  3. x11.pc : x11/libX11
Runtime dependencies:
  1. x11.pc : x11/libX11
Library dependencies:
  1. libatk-1.0.so : accessibility/atk
  2. libcairo.so : graphics/cairo
  3. libgdk_pixbuf-2.0.so : graphics/gdk-pixbuf2
  4. libglib-2.0.so : devel/glib20
  5. libintl.so : devel/gettext-runtime
  6. libgtk-3.so : x11-toolkits/gtk30
  7. libpango-1.0.so : x11-toolkits/pango
There are no ports dependent upon this port

Configuration Options

USES:

Master Sites:
Expand this list (2 items)
    Collapse this list.
  1. ftp://ftp.chiark.greenend.org.uk/users/sgtatham/putty-latest/
  2. http://the.earth.li/~sgtatham/putty/0.74/
  3. Collapse this list.

Number of commits found: 68

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
01 Jul 2020 22:14:45
Original commit files touched by this commit  0.74_1
Revision:540995
mandree search for other commits by this committer
security/putty*: take LICENCE file from extracted source,

...rather than copying it into $FILESDIR where it would require
maintenance.

Reported by:	danfe@
28 Jun 2020 13:59:48
Original commit files touched by this commit  0.74_1
Revision:540719
mandree search for other commits by this committer
security/putty*: rename and update LICENCE from tarball.
28 Jun 2020 13:59:34
Original commit files touched by this commit  0.74
Revision:540718
mandree search for other commits by this committer
security/putty*: rename and update LICENCE from tarball.
28 Jun 2020 13:55:47
Original commit files touched by this commit  0.74
Revision:540716
mandree search for other commits by this committer
security/putty*: upgrade to 0.74 security fix release

Changelog:
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

among them are these two---and more bugfixes beyond not listed here:

  * Security fix: if an SSH server accepted an offer of a public key
    and then rejected the signature, PuTTY could access freed memory,
    if the key had come from an SSH agent.

  * Security feature: new config option to disable PuTTY's dynamic
    host key preference policy, if you prefer to avoid giving away
    to eavesdroppers which hosts you have stored keys for.

MFH:		2020Q2
Security:       6190c0cd-b945-11ea-9401-2dcf562daa69
Security:       CVE-2020-14002
Security:       FZI-2020-5
26 Apr 2020 13:51:54
Original commit files touched by this commit  0.73
Revision:533061 This port version is marked as vulnerable.
mandree search for other commits by this committer
WWW/DL link maintenance in pkg-descr and Makefile

...to avoid permanent redirects, or broken sites.

MFH:		2020Q2 (blanket, download/WWW URL chase)
18 Oct 2019 15:58:50
Original commit files touched by this commit  0.73
Revision:514728 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to upstream release 0.73 (security fixes)

Relevant changes taken from this...
ChangeLog:	https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

* Security fix: in bracketed paste mode, the terminal escape sequences that
  should delimit the pasted data were appearing together on one side of it,
  making it possible to misidentify pasted data as manual keyboard input.
* Bug fix (possibly security-related): an SSH-1 server sending a disconnection
  message could cause an access to freed memory.
* Bug fix: tweaked terminal handling to prevent lost characters at the ends of
  lines in gcc's coloured error messages.
* Bug fix: removed a bad interaction between the 'clear scrollback' operation
  and mouse selection that could give rise to the dreaded "line==NULL"
  assertion box.

MFH:		2019Q4
09 Oct 2019 12:20:31
Original commit files touched by this commit  0.72
Revision:514144 This port version is marked as vulnerable.
bapt search for other commits by this committer
Drop the ipv6 virtual category for s* category as it is not relevant anymore
20 Jul 2019 16:16:42
Original commit files touched by this commit  0.72
Revision:507001 This port version is marked as vulnerable.
mandree search for other commits by this committer
Security update to new upstream release 0.72.

Security fixes found by the EU-funded bug bounty:
- two separate vulnerabilities affecting the obsolete SSH-1 protocol, both
available before host key checking
- a vulnerability in all the SSH client tools (PuTTY, Plink, PSFTP and PSCP) if
a malicious program can impersonate Pageant

Changelog:	https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

Switch off -DSTATIC_GSSAPI build as that produces non-working executables
(assertion failures). Bug has been reported upstream.

MFH:		2019Q3
Security:	5914705c-ab03-11e9-a4f9-080027ac955c
26 Mar 2019 23:58:57
Original commit files touched by this commit  0.71
Revision:496930 This port version is marked as vulnerable.
mandree search for other commits by this committer
Reinstate GSSAPI_NONE option.

Not bumping PORTREVISION as the default build is unaffected.

Obtained from:	Jacob Nevins, upstream Git commit 7ad08649
17 Mar 2019 14:17:26
Original commit files touched by this commit  0.71
Revision:496064 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update security/putty to 0.71 security fix release

Unfortunately, this new release breaks GSSAPI_NONE, which is removed
for now. Bug has been reported upstream.

Changelog: https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

MFH:		2019Q1
Security:	46e1ece5-48bd-11e9-9c40-080027ac955c
02 Apr 2018 21:29:17
Original commit files touched by this commit  0.70
Revision:466267 This port version is marked as vulnerable.
mandree search for other commits by this committer
Reinstate support for GTK2 (rather than GTK3) as an OPTION.

While here, add a putty-gtk2 slave port and update _CONFLICTS.

Since the default package does not change, and pkg would handle conflicts
around attempted installation of the new -gtk2 package, omit the
PORTREVISION bump from Miroslav's original patch.

PR:		227200
Submitted by:	Miroslav Lachman
15 Oct 2017 14:05:04
Original commit files touched by this commit  0.70
Revision:452147 This port version is marked as vulnerable.
madpilot search for other commits by this committer
Retire WITHOUT_DEBUG flag.

The flag has partial support across the tree, and the same effect
can be obtained by using ".undef WITH_DEBUG".

Reviewed by:		mat, rene
Approved by:		portmgr (rene)
Differential Revision:	https://reviews.freebsd.org/D12548
11 Aug 2017 12:58:55
Original commit files touched by this commit  0.70
Revision:447756 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to 0.70, and make GSSAPI impl. selectable.

PR:		220838
Submitted by:	cy@
13 May 2017 13:16:18
Original commit files touched by this commit  0.69_1
Revision:440836 This port version is marked as vulnerable.
mandree search for other commits by this committer
security/putty: install icon and .desktop file

PR:		219095
Submitted by:	ehaupt@
04 May 2017 21:27:43
Original commit files touched by this commit  0.69
Revision:440116 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream release 0.69.

Upstream change "You can now explicitly configure SSH terminal mode
settings not to be sent to the server, if your server objects to them."

Enable pageant, was missing from the 0.68 upgrade.

Switch to GTK3, no longer compiles with GTK2.

The security fixes contained in 0.69 are only good on Windows, so not
flagging this as a security update.
17 Mar 2017 08:33:49
Original commit files touched by this commit  0.68
Revision:436323 This port version is marked as vulnerable.
mandree search for other commits by this committer
Remove leftover files.

The reference to these had been removed as of r184036 on 2007-02-03 already.
17 Mar 2017 08:06:13
Original commit files touched by this commit  0.68
Revision:436321 This port version is marked as vulnerable.
mandree search for other commits by this committer
Add forgotten patch for Linux -> BSD portability.

Submitted by:	cy@
Reported by:	cy@
MFH:		2017Q1
Differential Revision:	https://reviews.freebsd.org/D10023
16 Mar 2017 23:39:58
Original commit files touched by this commit  0.68
Revision:436313 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream release 0.68 (security fixes)

Additional minor updates on top of cy@'s patch (USE_GNOME, USE_XORG,
LDFLAGS).

ChangeLog: http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

Submitted by:	cy@
MFH:		2017Q1
Security:	CVE-2017-6542
Security:	9b973e97-0a99-11e7-ace7-080027ef73ec
Differential Revision:	https://reviews.freebsd.org/D10023
16 Dec 2016 20:30:31
Original commit files touched by this commit  0.67
Revision:428696 This port version is marked as vulnerable.
mandree search for other commits by this committer
Add new putty-nogtk port as alternative SSH implementation.
20 Jul 2016 15:33:20
Original commit files touched by this commit  0.67
Revision:418840 This port version is marked as vulnerable.
mat search for other commits by this committer
Cleanup $() variables in ports Makefiles.

Mostly replace with ${}, but sometime, replace with $$() because it is
what was intended in the first place. (I think.)

Sponsored by:	Absolight
07 Mar 2016 16:54:16
Original commit files touched by this commit  0.67
Revision:410527 This port version is marked as vulnerable.
mandree search for other commits by this committer
Security upgrade to new upstream release 0.67.

Unix-relevant changes:
* Security fix: a buffer overrun in the old-style SCP protocol when receiving
  the header of each file downloaded from the server is fixed. (CVE-2016-2563)
* Assorted other robustness fixes for crashes and memory leaks.

MFH:		2016Q1
Security:	7f0fbb30-e462-11e5-a3f3-080027ef73ec
Security:	CVE-2016-2563
23 Nov 2015 11:44:33
Original commit files touched by this commit  0.66_1
Revision:402275 This port version is marked as vulnerable.
marino search for other commits by this committer
security/putty: Fix typo
23 Nov 2015 11:42:11
Refresh Original commit files touched by this commit
Revision:402274  Sanity Test Failure
marino search for other commits by this committer
security/putty: Fix krb5 dependency

Due to using both <bsd.port.pre.mk> and <bsd.port.options.mk>, the
USES+= gssapi:mit directive was ignored and not included in the build
dependency list.  Remove <pre>/<post> includes to fix.

Approved by:	mandree (maintainer)
09 Nov 2015 09:18:22
Original commit files touched by this commit  0.66
Revision:401087 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream release 0.66 (security fix).

Switch to USES=gssapi:mit.

Security:	CVE-2015-5309
Security:	0cb0afd9-86b8-11e5-bf60-080027ef73ec
15 Oct 2015 14:55:14
Original commit files touched by this commit  0.65
Revision:399346  Sanity Test Failure This port version is marked as vulnerable.
mat search for other commits by this committer
Drop 8 support.

With hat:	portmgr
Sponsored by:	Absolight
Differential Revision:	https://reviews.freebsd.org/D3694
29 Jul 2015 22:57:37
Original commit files touched by this commit  0.65
Revision:393203 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream bug-fix release 0.65

Release notes:
http://lists.tartarus.org/pipermail/putty-announce/2015/000021.html
14 May 2015 10:15:09
Original commit files touched by this commit  0.64
Revision:386312 This port version is marked as vulnerable.
mat search for other commits by this committer
MASTER_SITES cleanup.

- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
06 Mar 2015 20:29:54
Original commit files touched by this commit  0.64
Revision:380619 This port version is marked as vulnerable.
mandree search for other commits by this committer
Add CPE info.

PR:		198369
Submitted by:	shun.fbsd.pr@dropcut.net
05 Mar 2015 22:15:09
Original commit files touched by this commit  0.64
Revision:380554 This port version is marked as vulnerable.
mandree search for other commits by this committer
Upgrade to upstream bugfix release 0.64.

This fixes a security bug, various other bugs, and supports SSH
connection sharing between multiple instances of PuTTY and its tools.

MFH:		2015Q1
Security:	92fc2e2b-c383-11e4-8ef7-080027ef73ec
Security:	CVE-2015-2157
14 Jul 2014 18:42:04
Original commit files touched by this commit  0.63
Revision:361812 This port version is marked as vulnerable.
bapt search for other commits by this committer
Modernize LIB_DEPENDS

With hat:	portmgr
25 Jun 2014 05:35:32
Original commit files touched by this commit  0.63
Revision:359185 This port version is marked as vulnerable.
bapt search for other commits by this committer
Convert GMAKE to MAKE_CMD
Please note that lots of invocation of MAKE_CMD here are wrong as they do not
properly respect MAKE_ENV and friends

With hat:	portmgr
01 Oct 2013 14:53:26
Original commit files touched by this commit  0.63
Revision:328955 This port version is marked as vulnerable.
mandree search for other commits by this committer
Support staging.
20 Sep 2013 22:55:26
Original commit files touched by this commit  0.63
Revision:327769 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
12 Sep 2013 00:21:11
Original commit files touched by this commit  0.63
Revision:327018 This port version is marked as vulnerable.
marino search for other commits by this committer
Add explicit dependency on pkgconf (27 ports)
07 Aug 2013 16:11:18
Original commit files touched by this commit  0.63
Revision:324357 This port version is marked as vulnerable.
mandree search for other commits by this committer
Upgrade PuTTY to new 0.63 beta upstream release, adding vulnerability info.

Quoting the upstream's change log:

- Security fix: prevent a nefarious SSH server or network attacker from
  crashing PuTTY at startup in three different ways by presenting a maliciously
  constructed public key and signature.
- Security fix: PuTTY no longer retains the private half of users' keys in
  memory by mistake after authenticating with them.
- Revamped the internal configuration storage system to remove all fixed
  arbitrary limits on string lengths. In particular, there should now no longer
  be an unreasonably small limit on the number of port forwardings PuTTY can
  store.
- Port-forwarded TCP connections which close one direction before the other
  should now be reliably supported, with EOF propagated independently in the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
06 Jan 2013 13:04:46
Original commit files touched by this commit  0.62_3
Revision:309981 This port version is marked as vulnerable.
mandree search for other commits by this committer
Bump PORTREVISION, to get the ports rebuilt with ${CC}.
06 Jan 2013 12:52:31
Original commit files touched by this commit  0.62_2
Revision:309979 This port version is marked as vulnerable.
mandree search for other commits by this committer
- Convert to Options NG. Renames GTK option to GTK2 for consistency.
- Strip Makefile header.
- Make sure that the port build heeds ${CC}, passing it through MAKE_ARGS.
- Replace CC-is-clang specific -Wno-empty-body by unconditional -Wno-error.
- Remove LIB_DEPENDS ABI versions.
15 Nov 2012 23:33:59
Original commit files touched by this commit  0.62_1
Revision:307470 This port version is marked as vulnerable.
mandree search for other commits by this committer
Add CONFLICTS.

Suggested by:	ketas's ports conflicts checker
Feature safe:	yes
13 Oct 2012 13:39:59
Original commit files touched by this commit  0.62_1
Revision:305832 This port version is marked as vulnerable.
dinoex search for other commits by this committer
- cleanup comments
Feature safe: yes
01 Jun 2012 05:26:28
Original commit files touched by this commit  0.62_1
 This port version is marked as vulnerable.
dinoex search for other commits by this committer
- update png to 1.5.10
12 Dec 2011 19:57:18
Original commit files touched by this commit  0.62
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update PuTTY to new upstream security and bug fix release 0.62,
and add a new VuXML entry.

Changelog:     
http://lists.tartarus.org/pipermail/putty-announce/2011/000017.html
Security:       bbd5f486-24f1-11e1-95bc-080027ef73ec
Feature safe:   yes
11 Dec 2011 03:18:10
Original commit files touched by this commit  0.61
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Revise OPTIONS wording.

Feature safe: yes
30 Nov 2011 04:03:16
Original commit files touched by this commit  0.61
 This port version is marked as vulnerable.
cy search for other commits by this committer
Fix build with GSSAPI under 9.0.

Approved by:    tabthorp (portmgr)
Feature safe:   yes
17 Jul 2011 14:18:36
Original commit files touched by this commit  0.61
 This port version is marked as vulnerable.
mandree search for other commits by this committer
- Take over maintainership from beat@ along his suggestion,
  permit him to take it back or commit without my approval.
- Update to upstream version 0.61.
- Add OPTIONS for GSSAPI and GTK (both enabled by default).

  NOTE: GSSAPI is currently broken on 9-CURRENT because the
  Kerberos in base expects MD2 which isn't provided by OpenSSL.

- mark BROKEN on OSVERSION >= 900000 when GSSAPI is enabled
- heed CFLAGS, CC, WITH_DEBUG, INSTALL_* settings.
- WITHOUT_X11 is now an alias for WITHOUT_GTK
- drop utmp support, the upstream requires a utmpx implementation that
  FreeBSD does not provide in any version.
- Preliminary clang support (adds files/patch-timing.c)
- Refreshed patches.
03 Jul 2011 14:03:52
Original commit files touched by this commit  0.60_1
 This port version is marked as vulnerable.
ohauer search for other commits by this committer
-remove MD5
10 Feb 2010 21:10:05
Original commit files touched by this commit  0.60_1
 This port version is marked as vulnerable.
beat search for other commits by this committer
- Remove unneeded utmp.h include to fix build on CURRENT

Reported by:    pointyhat via erwin
28 Jan 2009 23:25:21
Original commit files touched by this commit  0.60_1
 This port version is marked as vulnerable.
beat search for other commits by this committer
Update my email address to @FreeBSD.org.

Approved by:    miwi (mentor)
04 Jan 2009 16:19:32
Original commit files touched by this commit  0.60_1
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Pass maintainership to submitter

Submitted by:   "Beat G├Ątzi" <beat@chruetertee.ch>
06 Jun 2008 14:01:07
Original commit files touched by this commit  0.60_1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Bump portrevision due to upgrade of devel/gettext.

The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).

PR:             ports/124340
Submitted by:   edwin@
Approved by:    portmgr (pav)
22 Jan 2008 15:58:21
Original commit files touched by this commit  0.60
 This port version is marked as vulnerable.
garga search for other commits by this committer
Drop maintainership
13 Jun 2007 12:03:01
Original commit files touched by this commit  0.60
 This port version is marked as vulnerable.
garga search for other commits by this committer
- Add one more MASTER_SITE
25 May 2007 12:34:15
Original commit files touched by this commit  0.60
 This port version is marked as vulnerable.
garga search for other commits by this committer
- Update to 0.60

PR:             ports/112377
Submitted by:   Dima Panov <fluffy@ael.ru>
19 May 2007 20:32:57
Original commit files touched by this commit  0.59_1
 This port version is marked as vulnerable.
flz search for other commits by this committer
- Welcome X.org 7.2 \o/.
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}.
15 Mar 2007 17:59:02
Original commit files touched by this commit  0.59
 This port version is marked as vulnerable.
garga search for other commits by this committer
Install puttygen even if you set WITHOUT_GTK since it doesn't require gtk.

PR:             ports/110335
Submitted by:   Kenneth Vestergaard Schmidt<kvs@pil.dk>
11 Feb 2007 17:10:04
Original commit files touched by this commit  0.59
 This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 0.59
03 Feb 2007 13:18:30
Original commit files touched by this commit  0.58_1
 This port version is marked as vulnerable.
garga search for other commits by this committer
- Remove 4.x support on my ports
13 May 2006 04:15:53
Original commit files touched by this commit  0.58_1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Remove USE_REINPLACE from all categories starting with S
07 Mar 2006 08:28:06
Original commit files touched by this commit  0.58_1
 This port version is marked as vulnerable.
ade search for other commits by this committer
Bump PORTREVISION on glib12/gtk12 consumer ports to ease the upgrade path.

Discussed with: kris
Approved by:    portmgr (implicit)
08 Nov 2005 14:33:36
Original commit files touched by this commit  0.58
 This port version is marked as vulnerable.
garga search for other commits by this committer
- Add SHA256
11 Jul 2005 16:47:16
Original commit files touched by this commit  0.58
 This port version is marked as vulnerable.
garga search for other commits by this committer
Change MAINTAINER to my @FreeBSD.org account

Approved by:    flz (mentor)
30 Apr 2005 15:17:39
Original commit files touched by this commit  0.58
 This port version is marked as vulnerable.
leeym search for other commits by this committer
- Update to 0.58
- Assign maintainership

PR:             80460
Submitted by:   Renato Botelho <freebsd@galle.com.br>
20 Feb 2005 21:09:31
Original commit files touched by this commit  0.57
 This port version is marked as vulnerable.
simon search for other commits by this committer
Security update to 0.57.

Security:      
http://vuxml.FreeBSD.org/a413ed94-836e-11d9-a9e7-0001020eed82.html
Approved by:    erwin (mentor)
28 Oct 2004 10:17:28
Original commit files touched by this commit  0.56
 This port version is marked as vulnerable.
dinoex search for other commits by this committer
- Security Update to 0.56
14 Oct 2004 05:23:15
Original commit files touched by this commit  0.55
 This port version is marked as vulnerable.
dinoex search for other commits by this committer
- drop maintainership
04 Aug 2004 08:03:06
Original commit files touched by this commit  0.55
 This port version is marked as vulnerable.
dinoex search for other commits by this committer
- Security update to 0.55
15 Feb 2004 19:29:43
Original commit files touched by this commit  0.54_1
 This port version is marked as vulnerable.
dinoex search for other commits by this committer
- improve supoort of gtk
Submitted by:   fjoe
15 Feb 2004 07:52:59
Original commit files touched by this commit  0.54_1
 This port version is marked as vulnerable.
dinoex search for other commits by this committer
- Enable IPV6 Support per default
- new Option WITHOUT_IPV6
Submitted by:   ume
13 Feb 2004 17:45:39
Original commit files touched by this commit  0.54
 This port version is marked as vulnerable.
dinoex search for other commits by this committer
PuTTY is a client program for the SSH, Telnet and Rlogin network protocols.

These protocols are all used to run a remote session on a computer,
over a network. PuTTY implements the client end of that session:
the end at which the session is displayed, rather than the end
at which it runs.

WWW: http://www.chiark.greenend.org.uk/~sgtatham/putty/

Number of commits found: 68

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
freetype2Oct 22
chromiumOct 21
mysql56-serverOct 21
mysql57-serverOct 21
mysql80-serverOct 21
mariadb103-clientOct 18
mariadb103-serverOct 18
mariadb104-clientOct 18
mariadb104-serverOct 18
mariadb105-clientOct 18
mariadb105-serverOct 18
drupal7Oct 17
py-matrix-synapseOct 17
powerdns-recursorOct 14
linux-flashplayerOct 13

9 vulnerabilities affecting 118 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2020-10-22 09:39:08


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 41203
Broken 57
Deprecated 274
Ignore 294
Forbidden 4
Restricted 146
No CDROM 73
Vulnerable 23
Expired 10
Set to expire 245
Interactive 0
new 24 hours 3
new 48 hours14
new 7 days81
new fortnight110
new month210

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2020 Dan Langille. All rights reserved.