notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
Port details
putty Secure shell and telnet client including xterm emulator
0.81 security on this many watch lists=26 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 0.81Version of this port present on the latest quarterly branch.
Maintainer: mandree@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2004-02-13 17:46:26
Last Update: 2024-04-16 06:38:49
Commit Hash: f8f9196
People watching this port, also watch:: firefox, nmap, zip, gettext, curl
License: MIT
WWW:
https://www.chiark.greenend.org.uk/~sgtatham/putty/
Description:
PuTTY is a client program for the SSH, Telnet and Rlogin network protocols. These protocols are all used to run a remote session on a computer, over a network. PuTTY implements the client end of that session: the end at which the session is displayed, rather than the end at which it runs.
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (20 items)
Collapse this list.
  1. bin/pageant
  2. bin/plink
  3. bin/pscp
  4. bin/psftp
  5. bin/psusan
  6. bin/puttygen
  7. share/man/man1/pageant.1.gz
  8. share/man/man1/plink.1.gz
  9. share/man/man1/pscp.1.gz
  10. share/man/man1/psftp.1.gz
  11. share/man/man1/psusan.1.gz
  12. share/man/man1/puttygen.1.gz
  13. bin/pterm
  14. bin/putty
  15. share/man/man1/pterm.1.gz
  16. share/man/man1/putty.1.gz
  17. share/pixmaps/putty.ico
  18. /usr/local/share/licenses/putty-0.81/catalog.mk
  19. /usr/local/share/licenses/putty-0.81/LICENSE
  20. /usr/local/share/licenses/putty-0.81/MIT
Collapse this list.
Dependency lines:
  • putty>0:security/putty
Conflicts:
CONFLICTS_INSTALL:
  • pssh*
  • putty-nogtk*
To install the port:
cd /usr/ports/security/putty/ && make install clean
To add the package, run one of these commands:
  • pkg install security/putty
  • pkg install putty
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: putty
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1713247208 SHA256 (putty-0.81.tar.gz) = cb8b00a94f453494e345a3df281d7a3ed26bb0dd7e36264f145206f8857639fe SIZE (putty-0.81.tar.gz) = 2844616

Packages (timestamps in pop-ups are UTC):
putty
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest0.810.81--0.81---
FreeBSD:13:quarterly0.810.81--0.81-0.80_10.80_1
FreeBSD:14:latest0.810.81--0.81--0.78_1
FreeBSD:14:quarterly0.810.81--0.81-0.80_10.80_1
FreeBSD:15:latest0.810.81n/a0.81n/a-0.80_1-
Slave ports:
  1. security/putty-nogtk
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. cmake : devel/cmake-core
  2. ninja : devel/ninja
  3. pkgconf>=1.3.0_1 : devel/pkgconf
  4. perl5>=5.36<5.37 : lang/perl5.36
  5. x11.pc : x11/libX11
Runtime dependencies:
  1. x11.pc : x11/libX11
Library dependencies:
  1. libatk-1.0.so : accessibility/at-spi2-core
  2. libcairo.so : graphics/cairo
  3. libgdk_pixbuf-2.0.so : graphics/gdk-pixbuf2
  4. libglib-2.0.so : devel/glib20
  5. libintl.so : devel/gettext-runtime
  6. libgtk-3.so : x11-toolkits/gtk30
  7. libpango-1.0.so : x11-toolkits/pango
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for putty-0.81: GTK3=on: GTK 3 GUI toolkit support ====> Options available for the single GSSAPI_SELECT: you have to select exactly one of them GSSAPI_BASE=on: GSSAPI support via base system (needs Kerberos) GSSAPI_HEIMDAL=off: GSSAPI support via security/heimdal GSSAPI_MIT=off: GSSAPI support via security/krb5 GSSAPI_NONE=off: Disable GSSAPI support ===> Use 'make config' to modify these settings
Options name:
security_putty
USES:
cmake cpe perl5 pkgconfig xorg gnome gssapi:base,flags
FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (6 items)
Collapse this list.
  1. ftp://ftp.chiark.greenend.org.uk/users/sgtatham/putty-latest/
  2. http://distcache.FreeBSD.org/local-distfiles/mandree/
  3. http://distcache.eu.FreeBSD.org/local-distfiles/mandree/
  4. http://distcache.us-east.FreeBSD.org/local-distfiles/mandree/
  5. http://distcache.us-west.FreeBSD.org/local-distfiles/mandree/
  6. http://the.earth.li/~sgtatham/putty/0.81/
Collapse this list.

Number of commits found: 95

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
0.81
16 Apr 2024 06:38:49
commit hash: f8f9196ec1aa3e62b7e89d1630f4a61711737ffacommit hash: f8f9196ec1aa3e62b7e89d1630f4a61711737ffacommit hash: f8f9196ec1aa3e62b7e89d1630f4a61711737ffacommit hash: f8f9196ec1aa3e62b7e89d1630f4a61711737ffa files touched by this commit
Matthias Andree (mandree) search for other commits by this committer
security/putty: SECURITY update to 0.81

This fixes a vulnerability where NIST P521 ecdsa-sha2-nistp521 (only!)
keys can be recovered easily because signature generation in PuTTY used
a biased random number generator.

MFH:		2024Q2
Security:       080936ba-fbb7-11ee-abc8-6960f2492b1d
Security:       CVE-2024-31497
0.80_1
23 Dec 2023 18:14:14
commit hash: 3572ca3e01dedf1fe5b3776bd164e123252f5ef5commit hash: 3572ca3e01dedf1fe5b3776bd164e123252f5ef5commit hash: 3572ca3e01dedf1fe5b3776bd164e123252f5ef5commit hash: 3572ca3e01dedf1fe5b3776bd164e123252f5ef5 files touched by this commit This port version is marked as vulnerable.
Nuno Teixeira (eduardo) search for other commits by this committer
*/*: Bump consumers of x11-toolkits/gtk30

New version of gtk3 in tree
0.80
19 Dec 2023 22:24:04
commit hash: f9007a580563292af2d4ad675a6b414d26096438commit hash: f9007a580563292af2d4ad675a6b414d26096438commit hash: f9007a580563292af2d4ad675a6b414d26096438commit hash: f9007a580563292af2d4ad675a6b414d26096438 files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: security update → 0.80 to fix Terrapin vulnerability

Note this requires the server side to also add the protocol extension.

Security:	91955195-9ebb-11ee-bc14-a703705db3a6
Security:	CVE-2023-48795
Changelog:	https://lists.tartarus.org/pipermail/putty-announce/2023/000037.html
MFH:		2023Q4
0.79
27 Aug 2023 12:46:34
commit hash: 51b6c68f5d73369f070c9131461a5f7b5972e00bcommit hash: 51b6c68f5d73369f070c9131461a5f7b5972e00bcommit hash: 51b6c68f5d73369f070c9131461a5f7b5972e00bcommit hash: 51b6c68f5d73369f070c9131461a5f7b5972e00b files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: update → 0.79

ChangeLog: 	https://lists.tartarus.org/pipermail/putty-announce/2023/000036.html
MFH:		2023Q3
0.78_1
02 Mar 2023 05:23:10
commit hash: fa81a4f5f8ed2bc2104eca4ebbb1b69731bae2e8commit hash: fa81a4f5f8ed2bc2104eca4ebbb1b69731bae2e8commit hash: fa81a4f5f8ed2bc2104eca4ebbb1b69731bae2e8commit hash: fa81a4f5f8ed2bc2104eca4ebbb1b69731bae2e8 files touched by this commit This port version is marked as vulnerable.
Tobias C. Berner (tcberner) search for other commits by this committer
accessibility/at-spi2-core: update to 2.46.0

What's new in at-spi2-core 2.46.0:
* Fix GetInterfaces documentation on org.a11y.atspi.Accessible
  interface.

What's new in at-spi2-core 2.45.91:
* Send device event controller events using the same signature as other
  events.
* Document the Accessible, Action, and Cache dbus interfaces.
* Fix license of atspi-gmain.c (#87).

What's new in at-spi2-core 2.45.90:
* xml: Add some documentation.
* xml: Fix event arguments.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.78
29 Oct 2022 19:15:35
commit hash: a4d049c425af9241685bdc1ccae7f5aa29c42e85commit hash: a4d049c425af9241685bdc1ccae7f5aa29c42e85commit hash: a4d049c425af9241685bdc1ccae7f5aa29c42e85commit hash: a4d049c425af9241685bdc1ccae7f5aa29c42e85 files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: update to 0.78 release

FreeBSD relevant changes since 20221023 snapshot:

* f9a8213d 2022-10-29 | Docs: add a 'pdf' cmake target. (origin/main,
origin/HEAD) [Jacob Nevins]
* 4ff82ab2 2022-10-28 | Update version number for 0.78 release. (tag: 0.78)
[Simon Tatham]
* 475c2387 2022-10-28 | Unix: stop accessing ctrl->fileselect for font
selectors. [Simon Tatham]
* 329a4cdd 2022-10-24 | authplugin-example.py: Flush stderr. [Jacob Nevins]
* 538c8fd2 2022-10-24 | authplugin-example.py: Mention documentation. [Jacob
Nevins]
* a7106d8e 2022-10-23 | Add missing initialisation of term->osc_strlen. [Simon
Tatham]
* bdb3ac9f 2022-10-23 | Restrict -pwfile / -pw to apply to server prompts only.
[Simon Tatham]
* 2fbb9284 2022-10-23 | Fix outdated comment relating to -pw. [Jacob Nevins]
* f7e86ca2 2022-10-22 | README: remove mention of doc/Makefile. [Jacob Nevins]
* f229aab2 2022-10-23 | Rewrap a paragraph in README. [Jacob Nevins]

MFH:		2022Q4 (after 10 days)

According to Simon, he caught this assertion error in the act,
and 475c2387 should fix
PR:		267253
0.78.p20221023
23 Oct 2022 10:25:24
commit hash: 765de7a6ce543a53566a43544c07db2e2686e0dfcommit hash: 765de7a6ce543a53566a43544c07db2e2686e0dfcommit hash: 765de7a6ce543a53566a43544c07db2e2686e0dfcommit hash: 765de7a6ce543a53566a43544c07db2e2686e0df files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: update to snapshot 20221023

FreeBSD-relevant changes since previous snapshot:
* 75ac4443 2022-10-22 | Document subdomain matching of cert expr wildcards.
[Jacob Nevins]
* 500568d2 2022-10-22 | Docs: fix trivial typo from 6472f7fc77. [Jacob Nevins]
* 5f3b743e 2022-10-21 | Tweak certified-host-key prompt. [Jacob Nevins]
* bb1ebc9b 2022-10-21 | Docs: tweak certified-host-key warning responses. [Jacob
Nevins]
* 5716c638 2022-10-21 | Docs: cross-reference host-key warning sections. [Jacob
Nevins]
* 8c534c26 2022-10-21 | Docs: note "wrong host key" warning is stronger. [Jacob
Nevins]
* 1d1d81d6 2022-10-21 | Fix regressions in Gtk host key "More info". [Jacob
Nevins]
* dc9ab5e0 2022-10-21 | Rename NTRU Prime / Curve25519 kex in UI. [Jacob Nevins]
* 6472f7fc 2022-10-21 | Docs: update Pageant key list description. [Jacob
Nevins]
* 5d5a6a8f 2022-10-21 | Docs: MD5 is forced for SSH-1 key fingerprints. [Jacob
Nevins]
* d4298308 2022-10-21 | Docs: prime generation defaults are usually fine. [Jacob
Nevins]
* 2b5b7b5c 2022-10-21 | Docs: note warning about <2048-bit RSA/DSA keys. [Jacob
Nevins]
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.78~pre20220922_1
12 Oct 2022 20:14:20
commit hash: 1632d93d92d9ba58401834a571ba89860963a171commit hash: 1632d93d92d9ba58401834a571ba89860963a171commit hash: 1632d93d92d9ba58401834a571ba89860963a171commit hash: 1632d93d92d9ba58401834a571ba89860963a171 files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: fix ARM NEON AES-GCM code

Cherry-pick a test patch from upstream maintainer:

- this uses fallback code for compilers not providing vaddq_p128
  (f.i. clang-10 on FreeBSD 12.3 AMD64/aarch64)
- and uses vaddq_p128 on systems that provide it, for instance,
  FreeBSD 13-STABLE AMD64/aarch64 with clang 14.0.5

Obtained from:	Simon Tatham
MFH:		2022Q4
0.78~pre20220922
11 Oct 2022 22:17:18
commit hash: 8fc6b69f47e7ee7da005f8b59fc10522d287740bcommit hash: 8fc6b69f47e7ee7da005f8b59fc10522d287740bcommit hash: 8fc6b69f47e7ee7da005f8b59fc10522d287740bcommit hash: 8fc6b69f47e7ee7da005f8b59fc10522d287740b files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: fix aarch64 build on clang 10.

clang 10 (FreeBSD 12.3) does not support vaddq_p128 and similar
ARM NEON intrinsics, but clang 13 (FreeBSD 13.1) does.

Abuse the HAVE_NEON_PMULL cmake test to disable aesgcm-neon.c
unless vaddq_p128() is available.

http://ampere1.nyi.freebsd.org/data/123arm64-quarterly/31229ca1324c/logs/putty-nogtk-0.78~pre20220922.log:
/wrkdirs/usr/ports/security/putty-nogtk/work/putty-0.78~pre20220922.9fcfd67/crypto/aesgcm-neon.c:125:16:
warning: implicit declaration of function 'vaddq_p128' is invalid in C99
[-Wimplicit-function-declaration]
	ctx->acc = vaddq_p128(ctx->acc, load_p128_be(coeff));
0.78~pre20220922
22 Sep 2022 19:01:51
commit hash: 5a7297ac38566336450df1f6c8a69a0c817778f8commit hash: 5a7297ac38566336450df1f6c8a69a0c817778f8commit hash: 5a7297ac38566336450df1f6c8a69a0c817778f8commit hash: 5a7297ac38566336450df1f6c8a69a0c817778f8 files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: update to 0.78~pre20220922

This permits a FreeBSD build without patches; the two remaining
items are 1. avoiding the GSSAPI-related call into pkg-config because it
would not cover base-GSSAPI so we force the fallback to krb5-config
(which we control by way of ports/Mk/Uses/gssapi.mk), and
2. making sure PuTTY's build would not ascend directory hierarchy to
pick up our ports tree's Git information. We are only packaging
(pre-)release tarballs where we do not need to run Git.

Thanks to Simon Tatham, upstream maintainer, for issuing the
pre-releases and being very responsive and open to making the
build experience smooth for everyone.
0.78~pre20220919
22 Sep 2022 06:04:28
commit hash: 80d2d91271d91dbc2ea0e3199328206c4a983d5fcommit hash: 80d2d91271d91dbc2ea0e3199328206c4a983d5fcommit hash: 80d2d91271d91dbc2ea0e3199328206c4a983d5fcommit hash: 80d2d91271d91dbc2ea0e3199328206c4a983d5f files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: add Git patch to fix X11 inclusion

Pull in a fix from upstream's Git to avoid pulling in X11 headers
in no-GTK builds, so we can remove one more local workaround.
0.78~pre20220919
19 Sep 2022 17:29:09
commit hash: 4872e1bf8eb07e7f2cae42145539e1166162dc33commit hash: 4872e1bf8eb07e7f2cae42145539e1166162dc33commit hash: 4872e1bf8eb07e7f2cae42145539e1166162dc33commit hash: 4872e1bf8eb07e7f2cae42145539e1166162dc33 files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: Update to pre20220919 + 2 Git patches

This allows us to remove all local patch files.
0.78.p20220916.e1.b73.f0_3
18 Sep 2022 13:01:37
commit hash: aeada4ef180dedba3e988f0ce5b0cd1c210e6220commit hash: aeada4ef180dedba3e988f0ce5b0cd1c210e6220commit hash: aeada4ef180dedba3e988f0ce5b0cd1c210e6220commit hash: aeada4ef180dedba3e988f0ce5b0cd1c210e6220 files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: permanently remove GSSAPI_DYNAMIC

While it seems a nice idea to load the GSS provider library at run-time,
the existing search code hardwires library versions and only works
with krb5 (MIT Kerberos), and does not attempt to control library paths.

This sort of defeats the purpose, and we do not need a brittle
alternative for a robust GSSAPI_MIT.

So, drop the commented-out GSSAPI_DYNAMIC stuff from the Makefile.
0.78.p20220916.e1.b73.f0_3
18 Sep 2022 12:08:42
commit hash: 11605adf4600c1f01617bd98f38a1b30a1ac99fccommit hash: 11605adf4600c1f01617bd98f38a1b30a1ac99fccommit hash: 11605adf4600c1f01617bd98f38a1b30a1ac99fccommit hash: 11605adf4600c1f01617bd98f38a1b30a1ac99fc files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: Pick right Kerberos version

Make sure that putty only compiles and links against the configured
static GSSAPI version, especially against base even if krb5 or heimdal
are installed.

To that end, hand down the right krb5-config executable,
and punch out pkg-config from the shipped unix.cmake.
0.78.p20220916.e1.b73.f0_2
18 Sep 2022 11:42:48
commit hash: 7602a4002e7e273cd41c1fa879f7837f0b466816commit hash: 7602a4002e7e273cd41c1fa879f7837f0b466816commit hash: 7602a4002e7e273cd41c1fa879f7837f0b466816commit hash: 7602a4002e7e273cd41c1fa879f7837f0b466816 files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty*: clean up options and patches
0.78.p20220916.e1.b73.f0_1
18 Sep 2022 11:35:04
commit hash: 41f892414e181e8938f18ba78ce54a6153d2739ccommit hash: 41f892414e181e8938f18ba78ce54a6153d2739ccommit hash: 41f892414e181e8938f18ba78ce54a6153d2739ccommit hash: 41f892414e181e8938f18ba78ce54a6153d2739c files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: Fix static GSSAPI solutions,

with a patch received from Simon Tatham, and mask GSSAPI_DYNAMIC
for now, because it is not working. Debugging going on, but let's
get GSSAPI working at all for now, and make GSSAPI_BASE the default.
0.78.p20220916.e1.b73.f0
18 Sep 2022 11:35:04
commit hash: 8b46420daadaf0c374278ab9e11e9eba069e834acommit hash: 8b46420daadaf0c374278ab9e11e9eba069e834acommit hash: 8b46420daadaf0c374278ab9e11e9eba069e834acommit hash: 8b46420daadaf0c374278ab9e11e9eba069e834a files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: upgrade to pre-release 0.78~pre20220916.e1b73f0

ChangeLog: https://lists.tartarus.org/pipermail/putty-announce/2022/000034.html

Please test this thoroughly and if you happen to have a Kerberos-
or GSSAPI-enabled SSH server, please give the maintainer feedback
whether GSSAPI works for you and which GSSAPI library you have
installed.
07 Sep 2022 21:58:51
commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4 files touched by this commit
Stefan Eßer (se) search for other commits by this committer
Remove WWW entries moved into port Makefiles

Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.

This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.

Approved by:		portmgr (tcberner)
0.77
07 Sep 2022 21:10:59
commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52 files touched by this commit This port version is marked as vulnerable.
Stefan Eßer (se) search for other commits by this committer
Add WWW entries to port Makefiles

It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.

Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.

There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.77
07 Sep 2022 10:26:41
commit hash: b86221feeafaacbff38b27dd5999866460e3a67bcommit hash: b86221feeafaacbff38b27dd5999866460e3a67bcommit hash: b86221feeafaacbff38b27dd5999866460e3a67bcommit hash: b86221feeafaacbff38b27dd5999866460e3a67b files touched by this commit This port version is marked as vulnerable.
Tobias C. Berner (tcberner) search for other commits by this committer
cleanup: remove trailing whitepaces
0.77
27 May 2022 23:20:46
commit hash: f3d4c381ab172f5266130f329d09f6eb279babfbcommit hash: f3d4c381ab172f5266130f329d09f6eb279babfbcommit hash: f3d4c381ab172f5266130f329d09f6eb279babfbcommit hash: f3d4c381ab172f5266130f329d09f6eb279babfb files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: update to 0.77

PuTTY 0.77 changed its build system to cmake, and restructured the
source code, thus the patches were regenerated and updated.

As a consequence, GSSAPI_BASE no longer works because cmake wants
pkg-config and hence .pc files.

GSSAPI_HEIMDAL does not compile due to #define (&_foo) xxx.
Both GSSAPI_BASE and GSSAPI_HEIMDAL were disabled. Assistance solicited.

There is a new experimental GSSAPI_DYNAMIC which permits configuring the
GSS provider at run-time, which the package maintainer cannot test
for lack of Kerberized access somewhere. Feedback solicited.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.76
23 Nov 2021 22:11:40
commit hash: 5933ac0b099d61d98eb531d373cf57a8927bc7afcommit hash: 5933ac0b099d61d98eb531d373cf57a8927bc7afcommit hash: 5933ac0b099d61d98eb531d373cf57a8927bc7afcommit hash: 5933ac0b099d61d98eb531d373cf57a8927bc7af files touched by this commit This port version is marked as vulnerable.
Stefan Eßer (se) search for other commits by this committer
*/*: Remove redundant '-[0-9]*' from CONFLICTS_INSTALL

The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").

Approved by: portmgr (blanket)
0.76
14 Sep 2021 10:55:30
commit hash: 1ab5027227804eb941bf829231c438fb1eeca2b8commit hash: 1ab5027227804eb941bf829231c438fb1eeca2b8commit hash: 1ab5027227804eb941bf829231c438fb1eeca2b8commit hash: 1ab5027227804eb941bf829231c438fb1eeca2b8 files touched by this commit This port version is marked as vulnerable.
Bernhard Froehlich (decke) search for other commits by this committer
security/putty: Fix CPE information because current one is deprecated

Approved by:    portmgr (blanket)
0.76
18 Jul 2021 08:49:43
commit hash: 7807f3bad2cbeb019d5b53bda958a620e31683accommit hash: 7807f3bad2cbeb019d5b53bda958a620e31683accommit hash: 7807f3bad2cbeb019d5b53bda958a620e31683accommit hash: 7807f3bad2cbeb019d5b53bda958a620e31683ac files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: update to 0.76.

FreeBSD relevant changes per
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

+ New option to abandon an SSH connection if the server allows you to
  authenticate in a trivial manner.
+ Bug fix: user colour-palette reconfiguration via 'Change Settings'
  were delayed-action.
+ Bug fix: server colour-palette reconfigurations were sometimes lost.
+ Bug fix: a tight loop could occur on reading a truncated private key
  file.
0.75
08 May 2021 15:00:56
commit hash: 6b288be1e66ea83b1210a9bd2feac2359b76846acommit hash: 6b288be1e66ea83b1210a9bd2feac2359b76846acommit hash: 6b288be1e66ea83b1210a9bd2feac2359b76846acommit hash: 6b288be1e66ea83b1210a9bd2feac2359b76846a files touched by this commit This port version is marked as vulnerable.
Matthias Andree (mandree) search for other commits by this committer
security/putty: update to 0.75

https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

Deprecate -gtk2 version for Mid-December 2021.

Clean up a bit.
0.74_1
07 Apr 2021 08:09:01
commit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455c files touched by this commit This port version is marked as vulnerable.
Mathieu Arnold (mat) search for other commits by this committer
One more small cleanup, forgotten yesterday.
Reported by:	lwhsu
0.74_1
06 Apr 2021 14:31:07
commit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344eb files touched by this commit This port version is marked as vulnerable.
Mathieu Arnold (mat) search for other commits by this committer
Remove # $FreeBSD$ from Makefiles.
0.74_1
01 Jul 2020 22:14:45
Revision:540995Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
security/putty*: take LICENCE file from extracted source,

...rather than copying it into $FILESDIR where it would require
maintenance.

Reported by:	danfe@
0.74_1
28 Jun 2020 13:59:48
Revision:540719Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
security/putty*: rename and update LICENCE from tarball.
0.74
28 Jun 2020 13:59:34
Revision:540718Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
security/putty*: rename and update LICENCE from tarball.
0.74
28 Jun 2020 13:55:47
Revision:540716Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
security/putty*: upgrade to 0.74 security fix release

Changelog:
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

among them are these two---and more bugfixes beyond not listed here:

  * Security fix: if an SSH server accepted an offer of a public key
    and then rejected the signature, PuTTY could access freed memory,
    if the key had come from an SSH agent.

  * Security feature: new config option to disable PuTTY's dynamic
    host key preference policy, if you prefer to avoid giving away
    to eavesdroppers which hosts you have stored keys for.

MFH:		2020Q2
Security:       6190c0cd-b945-11ea-9401-2dcf562daa69
Security:       CVE-2020-14002
Security:       FZI-2020-5
0.73
26 Apr 2020 13:51:54
Revision:533061Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
WWW/DL link maintenance in pkg-descr and Makefile

...to avoid permanent redirects, or broken sites.

MFH:		2020Q2 (blanket, download/WWW URL chase)
0.73
18 Oct 2019 15:58:50
Revision:514728Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to upstream release 0.73 (security fixes)

Relevant changes taken from this...
ChangeLog:	https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

* Security fix: in bracketed paste mode, the terminal escape sequences that
  should delimit the pasted data were appearing together on one side of it,
  making it possible to misidentify pasted data as manual keyboard input.
* Bug fix (possibly security-related): an SSH-1 server sending a disconnection
  message could cause an access to freed memory.
* Bug fix: tweaked terminal handling to prevent lost characters at the ends of
  lines in gcc's coloured error messages.
* Bug fix: removed a bad interaction between the 'clear scrollback' operation
  and mouse selection that could give rise to the dreaded "line==NULL"
  assertion box.

MFH:		2019Q4
0.72
09 Oct 2019 12:20:31
Revision:514144Original commit files touched by this commit This port version is marked as vulnerable.
bapt search for other commits by this committer
Drop the ipv6 virtual category for s* category as it is not relevant anymore
0.72
20 Jul 2019 16:16:42
Revision:507001Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Security update to new upstream release 0.72.

Security fixes found by the EU-funded bug bounty:
- two separate vulnerabilities affecting the obsolete SSH-1 protocol, both
available before host key checking
- a vulnerability in all the SSH client tools (PuTTY, Plink, PSFTP and PSCP) if
a malicious program can impersonate Pageant

Changelog:	https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

Switch off -DSTATIC_GSSAPI build as that produces non-working executables
(assertion failures). Bug has been reported upstream.

MFH:		2019Q3
Security:	5914705c-ab03-11e9-a4f9-080027ac955c
0.71
26 Mar 2019 23:58:57
Revision:496930Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Reinstate GSSAPI_NONE option.

Not bumping PORTREVISION as the default build is unaffected.

Obtained from:	Jacob Nevins, upstream Git commit 7ad08649
0.71
17 Mar 2019 14:17:26
Revision:496064Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update security/putty to 0.71 security fix release

Unfortunately, this new release breaks GSSAPI_NONE, which is removed
for now. Bug has been reported upstream.

Changelog: https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

MFH:		2019Q1
Security:	46e1ece5-48bd-11e9-9c40-080027ac955c
0.70
02 Apr 2018 21:29:17
Revision:466267Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Reinstate support for GTK2 (rather than GTK3) as an OPTION.

While here, add a putty-gtk2 slave port and update _CONFLICTS.

Since the default package does not change, and pkg would handle conflicts
around attempted installation of the new -gtk2 package, omit the
PORTREVISION bump from Miroslav's original patch.

PR:		227200
Submitted by:	Miroslav Lachman
0.70
15 Oct 2017 14:05:04
Revision:452147Original commit files touched by this commit This port version is marked as vulnerable.
madpilot search for other commits by this committer
Retire WITHOUT_DEBUG flag.

The flag has partial support across the tree, and the same effect
can be obtained by using ".undef WITH_DEBUG".

Reviewed by:		mat, rene
Approved by:		portmgr (rene)
Differential Revision:	https://reviews.freebsd.org/D12548
0.70
11 Aug 2017 12:58:55
Revision:447756Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to 0.70, and make GSSAPI impl. selectable.

PR:		220838
Submitted by:	cy@
0.69_1
13 May 2017 13:16:18
Revision:440836Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
security/putty: install icon and .desktop file

PR:		219095
Submitted by:	ehaupt@
0.69
04 May 2017 21:27:43
Revision:440116Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream release 0.69.

Upstream change "You can now explicitly configure SSH terminal mode
settings not to be sent to the server, if your server objects to them."

Enable pageant, was missing from the 0.68 upgrade.

Switch to GTK3, no longer compiles with GTK2.

The security fixes contained in 0.69 are only good on Windows, so not
flagging this as a security update.
0.68
17 Mar 2017 08:33:49
Revision:436323Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Remove leftover files.

The reference to these had been removed as of r184036 on 2007-02-03 already.
0.68
17 Mar 2017 08:06:13
Revision:436321Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Add forgotten patch for Linux -> BSD portability.

Submitted by:	cy@
Reported by:	cy@
MFH:		2017Q1
Differential Revision:	https://reviews.freebsd.org/D10023
0.68
16 Mar 2017 23:39:58
Revision:436313Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream release 0.68 (security fixes)

Additional minor updates on top of cy@'s patch (USE_GNOME, USE_XORG,
LDFLAGS).

ChangeLog: http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

Submitted by:	cy@
MFH:		2017Q1
Security:	CVE-2017-6542
Security:	9b973e97-0a99-11e7-ace7-080027ef73ec
Differential Revision:	https://reviews.freebsd.org/D10023
0.67
16 Dec 2016 20:30:31
Revision:428696Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Add new putty-nogtk port as alternative SSH implementation.
0.67
20 Jul 2016 15:33:20
Revision:418840Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Cleanup $() variables in ports Makefiles.

Mostly replace with ${}, but sometime, replace with $$() because it is
what was intended in the first place. (I think.)

Sponsored by:	Absolight
0.67
07 Mar 2016 16:54:16
Revision:410527Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Security upgrade to new upstream release 0.67.

Unix-relevant changes:
* Security fix: a buffer overrun in the old-style SCP protocol when receiving
  the header of each file downloaded from the server is fixed. (CVE-2016-2563)
* Assorted other robustness fixes for crashes and memory leaks.

MFH:		2016Q1
Security:	7f0fbb30-e462-11e5-a3f3-080027ef73ec
Security:	CVE-2016-2563
0.66_1
23 Nov 2015 11:44:33
Revision:402275Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/putty: Fix typo
23 Nov 2015 11:42:11
Revision:402274Original commit files touched by this commit Sanity Test Failure Refresh
marino search for other commits by this committer
security/putty: Fix krb5 dependency

Due to using both <bsd.port.pre.mk> and <bsd.port.options.mk>, the
USES+= gssapi:mit directive was ignored and not included in the build
dependency list.  Remove <pre>/<post> includes to fix.

Approved by:	mandree (maintainer)
0.66
09 Nov 2015 09:18:22
Revision:401087Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream release 0.66 (security fix).

Switch to USES=gssapi:mit.

Security:	CVE-2015-5309
Security:	0cb0afd9-86b8-11e5-bf60-080027ef73ec
0.65
15 Oct 2015 14:55:14
Revision:399346Original commit files touched by this commit Sanity Test Failure This port version is marked as vulnerable.
mat search for other commits by this committer
Drop 8 support.

With hat:	portmgr
Sponsored by:	Absolight
Differential Revision:	https://reviews.freebsd.org/D3694
0.65
29 Jul 2015 22:57:37
Revision:393203Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream bug-fix release 0.65

Release notes:
http://lists.tartarus.org/pipermail/putty-announce/2015/000021.html
0.64
14 May 2015 10:15:09
Revision:386312Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
MASTER_SITES cleanup.

- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
0.64
06 Mar 2015 20:29:54
Revision:380619Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Add CPE info.

PR:		198369
Submitted by:	shun.fbsd.pr@dropcut.net
0.64
05 Mar 2015 22:15:09
Revision:380554Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Upgrade to upstream bugfix release 0.64.

This fixes a security bug, various other bugs, and supports SSH
connection sharing between multiple instances of PuTTY and its tools.

MFH:		2015Q1
Security:	92fc2e2b-c383-11e4-8ef7-080027ef73ec
Security:	CVE-2015-2157
0.63
14 Jul 2014 18:42:04
Revision:361812Original commit files touched by this commit This port version is marked as vulnerable.
bapt search for other commits by this committer
Modernize LIB_DEPENDS

With hat:	portmgr
0.63
25 Jun 2014 05:35:32
Revision:359185Original commit files touched by this commit This port version is marked as vulnerable.
bapt search for other commits by this committer
Convert GMAKE to MAKE_CMD
Please note that lots of invocation of MAKE_CMD here are wrong as they do not
properly respect MAKE_ENV and friends

With hat:	portmgr
0.63
01 Oct 2013 14:53:26
Revision:328955Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Support staging.
0.63
20 Sep 2013 22:55:26
Revision:327769Original commit files touched by this commit This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
0.63
12 Sep 2013 00:21:11
Revision:327018Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
Add explicit dependency on pkgconf (27 ports)
0.63
07 Aug 2013 16:11:18
Revision:324357Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Upgrade PuTTY to new 0.63 beta upstream release, adding vulnerability info.

Quoting the upstream's change log:

- Security fix: prevent a nefarious SSH server or network attacker from
  crashing PuTTY at startup in three different ways by presenting a maliciously
  constructed public key and signature.
- Security fix: PuTTY no longer retains the private half of users' keys in
  memory by mistake after authenticating with them.
- Revamped the internal configuration storage system to remove all fixed
  arbitrary limits on string lengths. In particular, there should now no longer
  be an unreasonably small limit on the number of port forwardings PuTTY can
  store.
- Port-forwarded TCP connections which close one direction before the other
  should now be reliably supported, with EOF propagated independently in the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.62_3
06 Jan 2013 13:04:46
Revision:309981Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Bump PORTREVISION, to get the ports rebuilt with ${CC}.
0.62_2
06 Jan 2013 12:52:31
Revision:309979Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
- Convert to Options NG. Renames GTK option to GTK2 for consistency.
- Strip Makefile header.
- Make sure that the port build heeds ${CC}, passing it through MAKE_ARGS.
- Replace CC-is-clang specific -Wno-empty-body by unconditional -Wno-error.
- Remove LIB_DEPENDS ABI versions.
0.62_1
15 Nov 2012 23:33:59
Revision:307470Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Add CONFLICTS.

Suggested by:	ketas's ports conflicts checker
Feature safe:	yes
0.62_1
13 Oct 2012 13:39:59
Revision:305832Original commit files touched by this commit This port version is marked as vulnerable.
dinoex search for other commits by this committer
- cleanup comments
Feature safe: yes
0.62_1
01 Jun 2012 05:26:28
Original commit files touched by this commit This port version is marked as vulnerable.
dinoex search for other commits by this committer
- update png to 1.5.10
0.62
12 Dec 2011 19:57:18
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update PuTTY to new upstream security and bug fix release 0.62,
and add a new VuXML entry.

Changelog:     
http://lists.tartarus.org/pipermail/putty-announce/2011/000017.html
Security:       bbd5f486-24f1-11e1-95bc-080027ef73ec
Feature safe:   yes
0.61
11 Dec 2011 03:18:10
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Revise OPTIONS wording.

Feature safe: yes
0.61
30 Nov 2011 04:03:16
Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Fix build with GSSAPI under 9.0.

Approved by:    tabthorp (portmgr)
Feature safe:   yes
0.61
17 Jul 2011 14:18:36
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
- Take over maintainership from beat@ along his suggestion,
  permit him to take it back or commit without my approval.
- Update to upstream version 0.61.
- Add OPTIONS for GSSAPI and GTK (both enabled by default).

  NOTE: GSSAPI is currently broken on 9-CURRENT because the
  Kerberos in base expects MD2 which isn't provided by OpenSSL.

- mark BROKEN on OSVERSION >= 900000 when GSSAPI is enabled
- heed CFLAGS, CC, WITH_DEBUG, INSTALL_* settings.
- WITHOUT_X11 is now an alias for WITHOUT_GTK
- drop utmp support, the upstream requires a utmpx implementation that
  FreeBSD does not provide in any version.
- Preliminary clang support (adds files/patch-timing.c)
- Refreshed patches.
0.60_1
03 Jul 2011 14:03:52
Original commit files touched by this commit This port version is marked as vulnerable.
ohauer search for other commits by this committer
-remove MD5
0.60_1
10 Feb 2010 21:10:05
Original commit files touched by this commit This port version is marked as vulnerable.
beat search for other commits by this committer
- Remove unneeded utmp.h include to fix build on CURRENT

Reported by:    pointyhat via erwin
0.60_1
28 Jan 2009 23:25:21
Original commit files touched by this commit This port version is marked as vulnerable.
beat search for other commits by this committer
Update my email address to @FreeBSD.org.

Approved by:    miwi (mentor)
0.60_1
04 Jan 2009 16:19:32
Original commit files touched by this commit This port version is marked as vulnerable.
miwi search for other commits by this committer
- Pass maintainership to submitter

Submitted by:   "Beat Gätzi" <beat@chruetertee.ch>
0.60_1
06 Jun 2008 14:01:07
Original commit files touched by this commit This port version is marked as vulnerable.
edwin search for other commits by this committer
Bump portrevision due to upgrade of devel/gettext.

The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).

PR:             ports/124340
Submitted by:   edwin@
Approved by:    portmgr (pav)
0.60
22 Jan 2008 15:58:21
Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Drop maintainership
0.60
13 Jun 2007 12:03:01
Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
- Add one more MASTER_SITE
0.60
25 May 2007 12:34:15
Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
- Update to 0.60

PR:             ports/112377
Submitted by:   Dima Panov <fluffy@ael.ru>
0.59_1
19 May 2007 20:32:57
Original commit files touched by this commit This port version is marked as vulnerable.
flz search for other commits by this committer
- Welcome X.org 7.2 \o/.
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}.
0.59
15 Mar 2007 17:59:02
Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Install puttygen even if you set WITHOUT_GTK since it doesn't require gtk.

PR:             ports/110335
Submitted by:   Kenneth Vestergaard Schmidt<kvs@pil.dk>
0.59
11 Feb 2007 17:10:04
Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 0.59
0.58_1
03 Feb 2007 13:18:30
Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
- Remove 4.x support on my ports
0.58_1
13 May 2006 04:15:53
Original commit files touched by this commit This port version is marked as vulnerable.
edwin search for other commits by this committer
Remove USE_REINPLACE from all categories starting with S
0.58_1
07 Mar 2006 08:28:06
Original commit files touched by this commit This port version is marked as vulnerable.
ade search for other commits by this committer
Bump PORTREVISION on glib12/gtk12 consumer ports to ease the upgrade path.

Discussed with: kris
Approved by:    portmgr (implicit)
0.58
08 Nov 2005 14:33:36
Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
- Add SHA256
0.58
11 Jul 2005 16:47:16
Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Change MAINTAINER to my @FreeBSD.org account

Approved by:    flz (mentor)
0.58
30 Apr 2005 15:17:39
Original commit files touched by this commit This port version is marked as vulnerable.
leeym search for other commits by this committer
- Update to 0.58
- Assign maintainership

PR:             80460
Submitted by:   Renato Botelho <freebsd@galle.com.br>
0.57
20 Feb 2005 21:09:31
Original commit files touched by this commit This port version is marked as vulnerable.
simon search for other commits by this committer
Security update to 0.57.

Security:      
http://vuxml.FreeBSD.org/a413ed94-836e-11d9-a9e7-0001020eed82.html
Approved by:    erwin (mentor)
0.56
28 Oct 2004 10:17:28
Original commit files touched by this commit This port version is marked as vulnerable.
dinoex search for other commits by this committer
- Security Update to 0.56
0.55
14 Oct 2004 05:23:15
Original commit files touched by this commit This port version is marked as vulnerable.
dinoex search for other commits by this committer
- drop maintainership
0.55
04 Aug 2004 08:03:06
Original commit files touched by this commit This port version is marked as vulnerable.
dinoex search for other commits by this committer
- Security update to 0.55
0.54_1
15 Feb 2004 19:29:43
Original commit files touched by this commit This port version is marked as vulnerable.
dinoex search for other commits by this committer
- improve supoort of gtk
Submitted by:   fjoe
0.54_1
15 Feb 2004 07:52:59
Original commit files touched by this commit This port version is marked as vulnerable.
dinoex search for other commits by this committer
- Enable IPV6 Support per default
- new Option WITHOUT_IPV6
Submitted by:   ume
0.54
13 Feb 2004 17:45:39
Original commit files touched by this commit This port version is marked as vulnerable.
dinoex search for other commits by this committer
PuTTY is a client program for the SSH, Telnet and Rlogin network protocols.

These protocols are all used to run a remote session on a computer,
over a network. PuTTY implements the client end of that session:
the end at which the session is displayed, rather than the end
at which it runs.

WWW: http://www.chiark.greenend.org.uk/~sgtatham/putty/

Number of commits found: 95