Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: putty | Distribution: SUSE Linux Enterprise 15 SP6 |
Version: 0.81 | Vendor: openSUSE |
Release: bp156.1.1 | Build date: Tue May 28 10:03:09 2024 |
Group: System/X11/Utilities | Build host: s390zp24 |
Size: 7722008 | Source RPM: putty-0.81-bp156.1.1.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: http://www.chiark.greenend.org.uk/~sgtatham/putty/ | |
Summary: SSH client with optional GTK-based terminal emulator frontend |
PuTTY is a suite of terminal emulator application and client for serial consoles, raw TCP connections, and the computing protocols SSH, Telnet and rlogin. The "pterm" program is just the graphical terminal emulator similar to xterm, "plink" is just the (console-based) SSH client similar to openssh, and "putty" is the program that combines both in one.
MIT
* Mon Apr 15 2024 Jan Engelhardt <jengelh@inai.de> - Update to release 0.81 * Fix CVE-2024-31497: NIST P521 / ecdsa-sha2-nistp521 signatures are no longer generated with biased values of k. The previous bias compromises private keys. * Mon Dec 18 2023 Jan Engelhardt <jengelh@inai.de> - Update to release 0.80 * Fix CVE-2023-48795 [boo#1218128] * Sun Aug 27 2023 Jan Engelhardt <jengelh@inai.de> - Update to release 0.79 * Terminal mouse tracking: support for mouse movements which are not drags, and support for horizontal scroll events (e.g. generated by trackpads). * Fixed: PuTTY could fail an assertion if a resize control sequence was sent by the server while the window was docked to one half of the screen in KDE. * Fixed: PuTTY could fail an assertion if you tried to change the font size while the window was maximised. * Sun Oct 30 2022 Jan Engelhardt <jengelh@inai.de> - Update to release 0.78 * Support for OpenSSH certificates, for both user authentication keys and host keys. * New SSH proxy modes, for running a custom shell command or subsystem on the proxy server instead of forwarding a port through it. * New plugin system to allow a helper program to provide responses in keyboard-interactive authentication, intended to automate one-time password systems. * Support for NTRU Prime post-quantum key exchange, * Support for AES-GCM (in the OpenSSH style rather than RFC 5647). * Support for more forms of Diffie-Hellman key exchange: new larger integer groups (such as group16 and group18), and support for using those and ECDH with GSSAPI. * Bug fix: server-controlled window title setting now works again even if the character set is ISO 8859 (or a few other affected single-byte character sets). * Bug fix: certain forms of OSC escape sequences (sent by some real servers) could cause PuTTY to crash. * Bug fix: the -pwfile/-pw options no longer affect local key passphrase prompts, and no longer suppress Plink's anti-spoofing measures. * Sat May 28 2022 Jan Engelhardt <jengelh@inai.de> - Update to release 0.77 * Major improvements to network proxy support: * Support for interactively prompting the user if the proxy server requires authentication. * Built-in support for proxying via another SSH server, so that PuTTY will SSH to the proxy and then automatically forward a port through it to the destination host. (Similar to running plink -nc as a subprocess, but more convenient to set up, and allows you to answer interactive prompts presented by the proxy.) * Support for HTTP Digest authentication, when talking to HTTP proxies. * New configuration options for keyboard handling: * Option to control handling of Shift + arrow keys * Extra mode in the function-keys option, for modern xterm (v216 and above). * Crypto update: added side-channel resistance in probabilistic RSA key generation. * Crypto update: retired the use of short Diffie-Hellman exponents. * Sun Jul 18 2021 Jan Engelhardt <jengelh@inai.de> - Update to release 0.76 * New option to abandon an SSH connection if the server allows you to authenticate in a trivial manner. * Bug fix: server colour-palette reconfigurations were sometimes lost. * Mon May 10 2021 Jan Engelhardt <jengelh@inai.de> - Update to release 0.75 * Upgraded default SSH key fingerprint format to OpenSSH-style SHA-256. * Upgraded private key file format to PPK3, with improved passphrase hashing and no use of SHA-1. * Terminal now supports ESC [ 9 m for strikethrough text. * New protocols: bare ssh-connection layer for use over already-secure IPC channels, and SUPDUP for talking to very old systems such as PDP-10s. * PuTTYgen now supports alternative provable-prime generation algorithm for RSA and DSA. * The Unix tools can now connect directly to a Unix-domain socket. * Sun Jun 28 2020 Jan Engelhardt <jengelh@inai.de> - Update to release 0.74 * Fixed a possible vulnerability [boo#1173442] * Added a new configuration option to mitigate a minor information leak in SSH host key policy. - Remove empty %post/%postun (says rpmlint) * Tue Oct 01 2019 Jan Engelhardt <jengelh@inai.de> - Update to release 0.73 * In bracketed paste mode, the terminal escape sequences that should delimit the pasted data were appearing together on one side of it, making it possible to misidentify pasted data as manual keyboard input. [CVE-2019-17068, boo#1152753] * An SSH-1 server sending a disconnection message could cause an access to freed memory. [CVE-2019-17069] * Tweaked terminal handling to prevent lost characters at the ends of lines in gcc's colored error messages. * Removed a bad interaction between the "clear scrollback" operation and mouse selection that could give rise to the dreaded "line==NULL" assertion box. * Mon Aug 12 2019 Jan Engelhardt <jengelh@inai.de> - Update to new upstream release 0.72 [boo#1144547, boo#1144548] * Fixed two separate vulnerabilities affecting the obsolete SSH-1 protocol, both available before host key checking. * Fixed a vulnerability in all the SSH client tools (PuTTY, Plink, PSFTP and PSCP) if a malicious program can impersonate Pageant. * Fixed a crash in GSSAPI / Kerberos key exchange triggered if the server provided an ordinary SSH host key as part of the exchange. - Drop 0001-Revert-settings.c-allow-load_open_settings-NULL.patch (merged) * Wed Apr 24 2019 Jan Engelhardt <jengelh@inai.de> - Reenable Xresources / remove -DNOT_X_WINDOWS [boo#1133181], the crash under Wayland appears gone. - Add 0001-Revert-settings.c-allow-load_open_settings-NULL.patch [boo#1133181] * Mon Mar 18 2019 Jan Engelhardt <jengelh@inai.de> - Unbreak the Leap 42.3 build of putty. - Update package descriptions. * Sun Mar 17 2019 Jan Engelhardt <jengelh@inai.de> - Update to new upstream release 0.71 [boo#1129633] * Fixed a remotely triggerable memory overwrite in RSA key exchange, which can occur before host key verification potential recycling of random numbers used in cryptography. * Fixed a remotely triggerable buffer overflow in any kind of server-to-client forwarding. * Fixed multiple denial-of-service attacks that can be triggered by writing to the terminal. * Major rewrite of the crypto code to remove cache and timing side channels. * Thu Jun 07 2018 jnwang@suse.com - Turn on -DNOT_X_WINDOWS, for Wayland system. Fixes a crash occurring in libX11 when running under Wayland [boo#1098962]. * Sat Mar 03 2018 jengelh@inai.de - Turn off -Werror. * Thu Dec 14 2017 jengelh@inai.de - Update python BuildRequire to python-base * Thu Dec 14 2017 jengelh@inai.de - Add missing python BuildRequire (for mkicon.py) * Tue Jul 11 2017 jengelh@inai.de - Update to new upstream release 0.70 * Update Unicode data to version 9 - Remove gtk-buildfix.diff (merged upstream) * Tue May 02 2017 bwiedemann@suse.com - Add reproducible.patch to use convert -strip to not have timestamps in png files to make build fully reproducible * Tue May 02 2017 idonmez@suse.com - Update to new upstream release 0.69 * You can now explicitly configure SSH terminal mode settings not to be sent to the server, if your server objects to them. - Switch to gtk+3 interface, add gtk-buildfix.diff. * Wed Mar 15 2017 jengelh@inai.de - Update to new upstream release 0.68 * resolve integer overflow in the ssh_agent_channel_data [CVE-2017-6542, boo#1029256] - Drop reproducible.patch, no longer applies * Tue Mar 08 2016 bwiedemann@suse.com - Add reproducible.patch to fix build-compare * Tue Mar 08 2016 jengelh@inai.de - Update to new upstream release 0.67 * resolved a security issue with the PSCP protocol implementation * Mon Nov 09 2015 jengelh@inai.de - Update to new upstream release 0.66 * Resolve integer overflow, buffer underrun in terminal emulator's ECH handling. [CVE-2015-5309, bnc#954191] * Resolve format string vulnerabilities * Mon Jul 27 2015 jengelh@inai.de - Update to new upstream release 0.65 * Cryptography speedup on 64-bit Unix platforms by using gcc and clang's __uint128_t built-in type. * Bug fix: PSFTP now returns a failure exit status if a command fails in a batch-mode script. * Bug fix: ESC [ 13 t can no longer elicit an invalid escape sequence as a response. * Wed May 13 2015 aj@ajaissle.de - Build icons and add a .desktop file for putty * Mon Mar 02 2015 jengelh@inai.de - Update to new upstream release 0.64 * Security fix: PuTTY no longer retains the private half of users' keys in memory by mistake after authenticating with them. [bnc#920167] (CVE-2015-2157) * Support for SSH connection sharing, so that multiple instances of PuTTY to the same host can share a single SSH connection instead of all having to log in independently. * Bug fix: IPv6 literals are handled sensibly throughout the suite, if you enclose them in square brackets to prevent the colons being mistaken for a :port suffix. - Remove 0001-Revert-the-default-for-font-bolding-style.patch (merged upstream), putty-04-nodate.diff (no longer needed).
/usr/bin/pageant /usr/bin/plink /usr/bin/pscp /usr/bin/psftp /usr/bin/psusan /usr/bin/pterm /usr/bin/putty /usr/bin/puttygen /usr/share/applications/putty.desktop /usr/share/doc/packages/putty /usr/share/doc/packages/putty/authplugin.but /usr/share/doc/packages/putty/blurb.but /usr/share/doc/packages/putty/chmextra.but /usr/share/doc/packages/putty/config.but /usr/share/doc/packages/putty/errors.but /usr/share/doc/packages/putty/faq.but /usr/share/doc/packages/putty/feedback.but /usr/share/doc/packages/putty/gs.but /usr/share/doc/packages/putty/index.but /usr/share/doc/packages/putty/intro.but /usr/share/doc/packages/putty/man-pageant.but /usr/share/doc/packages/putty/man-plink.but /usr/share/doc/packages/putty/man-pscp.but /usr/share/doc/packages/putty/man-psftp.but /usr/share/doc/packages/putty/man-psocks.but /usr/share/doc/packages/putty/man-psusan.but /usr/share/doc/packages/putty/man-pterm.but /usr/share/doc/packages/putty/man-putty.but /usr/share/doc/packages/putty/man-puttygen.but /usr/share/doc/packages/putty/man-puttytel.but /usr/share/doc/packages/putty/mancfg.but /usr/share/doc/packages/putty/manpages.but /usr/share/doc/packages/putty/pageant.but /usr/share/doc/packages/putty/pgpkeys.but /usr/share/doc/packages/putty/plink.but /usr/share/doc/packages/putty/pscp.but /usr/share/doc/packages/putty/psftp.but /usr/share/doc/packages/putty/pubkey.but /usr/share/doc/packages/putty/pubkeyfmt.but /usr/share/doc/packages/putty/site.but /usr/share/doc/packages/putty/sshnames.but /usr/share/doc/packages/putty/udp.but /usr/share/doc/packages/putty/using.but /usr/share/doc/packages/putty/version.but /usr/share/doc/packages/putty/vids.but /usr/share/licenses/putty /usr/share/licenses/putty/LICENCE /usr/share/man/man1/pageant.1.gz /usr/share/man/man1/plink.1.gz /usr/share/man/man1/pscp.1.gz /usr/share/man/man1/psftp.1.gz /usr/share/man/man1/psusan.1.gz /usr/share/man/man1/pterm.1.gz /usr/share/man/man1/putty.1.gz /usr/share/man/man1/puttygen.1.gz /usr/share/pixmaps/pterm.png /usr/share/pixmaps/pterm.xpm /usr/share/pixmaps/putty.png /usr/share/pixmaps/putty.xpm
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 20:22:04 2024