Commit Graph

45 Commits

Author SHA1 Message Date
sthen 54cccd0aaa update to putty-0.78
this has a lot of nice new things, including OpenSSH certificates,
NTRU Prime, AES-GCM and addition D-H key exchange mechanisms - see
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
2022-10-31 15:59:43 +00:00
sthen e3d2552901 net/putty: don't fail if misc/dialog is installed at build time 2022-09-02 17:19:10 +00:00
kmos d4915d7b19 Do the usual C99 dance to fix build on sparc64 2022-06-02 13:26:42 +00:00
sthen 55da48bd79 update to putty-0.77 2022-05-27 12:06:46 +00:00
naddy 3f5796b9fd drop RCS Ids 2022-03-11 19:45:43 +00:00
sthen 76629a4749 update to putty-0.76, mostly fixes but an interesting new optional
feature "Disconnect if authentication succeeds trivially", more
information in the new text for 2021-07-17 at the bottom of
https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-auth-prompt-spoofing.html
2021-07-17 12:01:54 +00:00
sthen 38261fe8a5 missed cvs rm; reported by aja@ 2021-05-09 07:48:42 +00:00
sthen 27b777bc92 update to PuTTY-0.75, changes include:
- private key format has been udpated and now uses Argon2
- new algorithms; Curve448 kex, Ed448 pub keys, SHA-2 RSA variants
- pageant permits loading an encrypted private key and only giving the
passphrase later when it's used

https://lists.tartarus.org/pipermail/putty-announce/2021/000031.html
2021-05-08 10:26:22 +00:00
sthen b75f63f150 update to PuTTY 0.74
- In some situations an SSH server could cause PuTTY to access freed
memory by pretending to accept an SSH key and then refusing the
actual signature. It can only happen if you're using an SSH agent.

- New configuration option to disable PuTTY's default policy of
changing its host key algorithm preferences to prefer keys it
already knows. (There is a theoretical information leak in this
policy.)
2020-06-27 11:56:19 +00:00
sthen 78c8ee7d89 security update to PuTTY 0.73
"This is a SECURITY UPDATE, fixing minor vulnerabilities affecting port
forwarding on Windows; bracketed paste mode in the terminal; and any
use of SSH-1. We recommend that anyone using those features should
update."
2019-09-30 08:45:39 +00:00
sthen 5bfdda04be update to PuTTY 0.72, "fixes a small number of further security issues
found by the 2019 EU-funded HackerOne bug bounty, and a variety of other
bugs introduced in 0.71"
2019-07-20 11:55:25 +00:00
sthen 48b0b9660c replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:48:23 +00:00
sthen e215c9b465 use autoreconf in net/putty for a tidier Makefile 2019-07-04 15:39:32 +00:00
naddy ebf751b927 Update gettext to 0.20.1.
Follow the upstream recommendations for packagers and switch to
multi-packages:
devel/gettext       -> devel/gettext,-runtime
devel/gettext-tools -> devel/gettext,-tools
(new)                  devel/gettext,-textstyle
2019-05-20 22:15:00 +00:00
sthen aae94ffc2a net/putty packaging change: move pageant to gui, it's linked against X11 libs.
add a comment in case this can be moved back in a future update.
2019-05-17 15:39:59 +00:00
sthen a85da3b14e add putty patches: pageant fix from freebsd, arm/aarch64 fix from upstream 2019-03-31 10:55:48 +00:00
sthen 6b419c1a13 udpate to PuTTY 0.71 2019-03-16 22:09:30 +00:00
bentley f69349a2a5 HTTPS for chiark.greenend.org.uk. 2019-01-17 10:13:40 +00:00
sthen da0083b97a fix deps, moved to gtk+3 2017-05-01 20:26:59 +00:00
sthen bcd6fe806f update to PuTTY-0.69
disable new pageant build for now, doesn't build (setpgrp)
2017-04-30 22:29:53 +00:00
sthen e0a9df7338 force WARNINGOPTS in MAKE_FLAGS to disable -Werror 2017-04-23 21:51:43 +00:00
ajacoutot 5558c792d3 First pass at pre-entively fixing ports that would break once guenther's header
pollution diff is in.

lang/squeak/vm does not build but it's due to the recent audio changes
games/xbattle: also fixes some conflicting implicit decl
print/hplip: also fixes some conflicting implicit decl
2016-09-10 13:03:40 +00:00
sthen 7070876d4d security update to PuTTY 0.67
This release fixes a security hole in PSCP, in the old-style SCP
protocol. A server sending a malformed header before the contents of the
file could overrun a buffer exploitably in PSCP. [CVE-2016-2563]

plus "Assorted other fixes for crash-type bugs (but none known to be
exploitable)".
2016-03-05 12:58:20 +00:00
sthen 8254c98c8a SECURITY update to PuTTY 0.66
"This release fixes a security hole in the terminal emulation code.
Writing a particular escape sequence to the screen in a PuTTY terminal
session could cause the terminal code to read *and potentially write*
memory outside its own data structures. This might be exploitable, so
everybody should upgrade to a fixed version."
2015-11-07 17:46:06 +00:00
sthen 7f12da1222 update to PuTTY-0.65 2015-09-12 20:22:35 +00:00
sthen 91f106609c security update to PuTTY 0.64
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html
2015-03-24 16:43:48 +00:00
sthen 2d86a328e0 use version number in MASTER_SITES directory rather than "latest" so they
won't go out of date; no pkg change
2014-06-03 10:55:54 +00:00
sthen 10a472aa72 SECURITY update to PuTTY 0.63 - ok brad@
- Vulnerability: non-coprime values in DSA signatures can cause buffer
overflow in modular inverse
- Vulnerability: buffer underrun in modmul can corrupt the heap
- Vulnerability: negative string length in public-key signatures can
cause integer overflow and overwrite all of memory
- Private keys left in memory after being used by PuTTY tools

N.B. some of these vulnerabilities where an SSH-2 server can make PuTTY
overrun or underrun buffers can be triggered *before* host key verification
so there is a risk from a spoofed server. For more info see the 0.63
section of http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/
2013-08-07 11:47:51 +00:00
espie eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
djm 128e83da3c drop MAINTAINERship of my ports. I simply don't have time to give them
the attention they deserve
2013-03-08 02:04:37 +00:00
sthen 9992816228 Unbreak build on a system without x11/gtk+ installed when autoconf is run;
the AM_PATH_GTK macro that was in configure.ac comes from the gtk+ package
itself.
2013-01-16 13:54:59 +00:00
brad 73958da403 Update to PuTTY 0.62.
ok djm@
2013-01-13 10:12:52 +00:00
naddy 44d52069bd We need to use posix_openpt().
Pull in aclocal because the distributed source doesn't include aclocal.m4.
ok djm@
2012-12-12 16:38:33 +00:00
naddy 8772c908e9 arpa/inet.h and netinet/in.h can now be #included in either order 2012-08-05 20:28:51 +00:00
naddy 0e9fe96aad remove workaround for gcc4 that is no longer needed 2012-06-27 19:30:04 +00:00
ajacoutot a89a75cd04 Garbage collect the /dev/arandom patches.
from Brad
ok landry@ sthen@
2012-03-08 12:13:00 +00:00
ajacoutot 94ccb4c91a Use the libiconv|gettext MODULE. 2011-07-06 23:56:08 +00:00
espie 0397d65db0 new depends 2010-11-19 22:31:32 +00:00
espie 49cc004681 new WANTLIB 2010-11-11 16:27:54 +00:00
espie 47ff75aa46 USE_GROFF=Yes 2010-10-18 18:36:45 +00:00
landry 9e89224507 Make sure netinet/in.h is included before arpa/inet.h.
Fixes build with -Wsystem-headers.
2010-07-22 14:26:53 +00:00
sthen d1c6f80880 use REVISION, checked with before/after make show=PKGNAMES (plus some
extra-careful checking where there are complicated PSEUDO_FLAVORS).
2010-07-12 22:07:37 +00:00
espie 68fb5c0991 silence warning for gcc4 (yes, the address is not null, no I don't fancy
changing the macro/code/whatever to fix that)
2010-05-22 12:28:39 +00:00
kili 8fc6287292 WANTLIB changes after xcb addition and bump. 2009-08-10 06:29:51 +00:00
djm adf1096a03 initial import of putty-0.60 SSH/telnet client:
PuTTY is a SSH and Telnet client implementation. This package
    contains the command-line clients and supporting utilities for
    key generation.

feedback steven@ mbalmer@; ok mbalmer@
2007-09-04 09:14:00 +00:00