Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

putty-0.78-bp155.1.1 RPM for armv7hl

From OpenSuSE Ports Leap 15.5 for armv7hl

Name: putty Distribution: SUSE Linux Enterprise 15 SP5
Version: 0.78 Vendor: openSUSE
Release: bp155.1.1 Build date: Mon Nov 7 13:26:59 2022
Group: System/X11/Utilities Build host: obs-arm-5
Size: 6366371 Source RPM: putty-0.78-bp155.1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: http://www.chiark.greenend.org.uk/~sgtatham/putty/
Summary: SSH client with optional GTK-based terminal emulator frontend
PuTTY is a suite of terminal emulator application and client for
serial consoles, raw TCP connections, and the computing protocols
SSH, Telnet and rlogin.

The "pterm" program is just the graphical terminal emulator similar
to xterm, "plink" is just the (console-based) SSH client similar to
openssh, and "putty" is the program that combines both in one.

Provides

Requires

License

MIT

Changelog

* Sun Oct 30 2022 Jan Engelhardt <jengelh@inai.de>
  - Update to release 0.78
    * Support for OpenSSH certificates, for both user
      authentication keys and host keys.
    * New SSH proxy modes, for running a custom shell command or
      subsystem on the proxy server instead of forwarding a port
      through it.
    * New plugin system to allow a helper program to provide
      responses in keyboard-interactive authentication, intended to
      automate one-time password systems.
    * Support for NTRU Prime post-quantum key exchange,
    * Support for AES-GCM (in the OpenSSH style rather than
      RFC 5647).
    * Support for more forms of Diffie-Hellman key exchange: new
      larger integer groups (such as group16 and group18), and
      support for using those and ECDH with GSSAPI.
    * Bug fix: server-controlled window title setting now works
      again even if the character set is ISO 8859 (or a few other
      affected single-byte character sets).
    * Bug fix: certain forms of OSC escape sequences (sent by some
      real servers) could cause PuTTY to crash.
    * Bug fix: the -pwfile/-pw options no longer affect local key
      passphrase prompts, and no longer suppress Plink's
      anti-spoofing measures.
* Sat May 28 2022 Jan Engelhardt <jengelh@inai.de>
  - Update to release 0.77
    * Major improvements to network proxy support:
    * Support for interactively prompting the user if the proxy
      server requires authentication.
    * Built-in support for proxying via another SSH server, so that
      PuTTY will SSH to the proxy and then automatically forward a
      port through it to the destination host. (Similar to running
      plink -nc as a subprocess, but more convenient to set up, and
      allows you to answer interactive prompts presented by the
      proxy.)
    * Support for HTTP Digest authentication, when talking to HTTP
      proxies.
    * New configuration options for keyboard handling:
    * Option to control handling of Shift + arrow keys
    * Extra mode in the function-keys option, for modern xterm
      (v216 and above).
    * Crypto update: added side-channel resistance in probabilistic
      RSA key generation.
    * Crypto update: retired the use of short Diffie-Hellman
      exponents.
* Sun Jul 18 2021 Jan Engelhardt <jengelh@inai.de>
  - Update to release 0.76
    * New option to abandon an SSH connection if the server allows
      you to authenticate in a trivial manner.
    * Bug fix: server colour-palette reconfigurations were
      sometimes lost.
* Mon May 10 2021 Jan Engelhardt <jengelh@inai.de>
  - Update to release 0.75
    * Upgraded default SSH key fingerprint format to OpenSSH-style
      SHA-256.
    * Upgraded private key file format to PPK3, with improved
      passphrase hashing and no use of SHA-1.
    * Terminal now supports ESC [ 9 m for strikethrough text.
    * New protocols: bare ssh-connection layer for use over
      already-secure IPC channels, and SUPDUP for talking to very
      old systems such as PDP-10s.
    * PuTTYgen now supports alternative provable-prime generation
      algorithm for RSA and DSA.
    * The Unix tools can now connect directly to a Unix-domain
      socket.
* Sun Jun 28 2020 Jan Engelhardt <jengelh@inai.de>
  - Update to release 0.74
    * Fixed a possible vulnerability [boo#1173442]
    * Added a new configuration option to mitigate a minor
      information leak in SSH host key policy.
  - Remove empty %post/%postun (says rpmlint)
* Tue Oct 01 2019 Jan Engelhardt <jengelh@inai.de>
  - Update to release 0.73
    * In bracketed paste mode, the terminal escape sequences that
      should delimit the pasted data were appearing together on one
      side of it, making it possible to misidentify pasted data as
      manual keyboard input. [CVE-2019-17068, boo#1152753]
    * An SSH-1 server sending a disconnection message could cause
      an access to freed memory. [CVE-2019-17069]
    * Tweaked terminal handling to prevent lost characters at the
      ends of lines in gcc's colored error messages.
    * Removed a bad interaction between the "clear scrollback"
      operation and mouse selection that could give rise to the
      dreaded "line==NULL" assertion box.
* Mon Aug 12 2019 Jan Engelhardt <jengelh@inai.de>
  - Update to new upstream release 0.72 [boo#1144547, boo#1144548]
    * Fixed two separate vulnerabilities affecting the obsolete
      SSH-1 protocol, both available before host key checking.
    * Fixed a vulnerability in all the SSH client tools (PuTTY,
      Plink, PSFTP and PSCP) if a malicious program can impersonate
      Pageant.
    * Fixed a crash in GSSAPI / Kerberos key exchange triggered if
      the server provided an ordinary SSH host key as part of the
      exchange.
  - Drop 0001-Revert-settings.c-allow-load_open_settings-NULL.patch
    (merged)
* Wed Apr 24 2019 Jan Engelhardt <jengelh@inai.de>
  - Reenable Xresources / remove -DNOT_X_WINDOWS [boo#1133181],
    the crash under Wayland appears gone.
  - Add 0001-Revert-settings.c-allow-load_open_settings-NULL.patch
    [boo#1133181]
* Mon Mar 18 2019 Jan Engelhardt <jengelh@inai.de>
  - Unbreak the Leap 42.3 build of putty.
  - Update package descriptions.
* Sun Mar 17 2019 Jan Engelhardt <jengelh@inai.de>
  - Update to new upstream release 0.71 [boo#1129633]
    * Fixed a remotely triggerable memory overwrite in RSA key
      exchange, which can occur before host key verification
      potential recycling of random numbers used in cryptography.
    * Fixed a remotely triggerable buffer overflow in any kind of
      server-to-client forwarding.
    * Fixed multiple denial-of-service attacks that can be triggered
      by writing to the terminal.
    * Major rewrite of the crypto code to remove cache and timing
      side channels.
* Thu Jun 07 2018 jnwang@suse.com
  - Turn on -DNOT_X_WINDOWS, for Wayland system.
    Fixes a crash occurring in libX11 when running under
    Wayland [boo#1098962].
* Sat Mar 03 2018 jengelh@inai.de
  - Turn off -Werror.
* Thu Dec 14 2017 jengelh@inai.de
  - Update python BuildRequire to python-base
* Thu Dec 14 2017 jengelh@inai.de
  - Add missing python BuildRequire (for mkicon.py)
* Tue Jul 11 2017 jengelh@inai.de
  - Update to new upstream release 0.70
    * Update Unicode data to version 9
  - Remove gtk-buildfix.diff (merged upstream)
* Tue May 02 2017 bwiedemann@suse.com
  - Add reproducible.patch to use convert -strip to not have timestamps
    in png files to make build fully reproducible
* Tue May 02 2017 idonmez@suse.com
  - Update to new upstream release 0.69
    * You can now explicitly configure SSH terminal mode settings
      not to be sent to the server, if your server objects to them.
  - Switch to gtk+3 interface, add gtk-buildfix.diff.
* Wed Mar 15 2017 jengelh@inai.de
  - Update to new upstream release 0.68
    * resolve integer overflow in the ssh_agent_channel_data
      [CVE-2017-6542, boo#1029256]
  - Drop reproducible.patch, no longer applies
* Tue Mar 08 2016 bwiedemann@suse.com
  - Add reproducible.patch to fix build-compare
* Tue Mar 08 2016 jengelh@inai.de
  - Update to new upstream release 0.67
    * resolved a security issue with the PSCP protocol implementation
* Mon Nov 09 2015 jengelh@inai.de
  - Update to new upstream release 0.66
    * Resolve integer overflow, buffer underrun in terminal emulator's
    ECH handling. [CVE-2015-5309, bnc#954191]
    * Resolve format string vulnerabilities
* Mon Jul 27 2015 jengelh@inai.de
  - Update to new upstream release 0.65
    * Cryptography speedup on 64-bit Unix platforms by using gcc and
    clang's __uint128_t built-in type.
    * Bug fix: PSFTP now returns a failure exit status if a command
    fails in a batch-mode script.
    * Bug fix: ESC [ 13 t can no longer elicit an invalid escape
    sequence as a response.
* Wed May 13 2015 aj@ajaissle.de
  - Build icons and add a .desktop file for putty
* Mon Mar 02 2015 jengelh@inai.de
  - Update to new upstream release 0.64
    * Security fix: PuTTY no longer retains the private half of users'
    keys in memory by mistake after authenticating with them.
    [bnc#920167] (CVE-2015-2157)
    * Support for SSH connection sharing, so that multiple instances of
    PuTTY to the same host can share a single SSH connection instead
    of all having to log in independently.
    * Bug fix: IPv6 literals are handled sensibly throughout the suite,
    if you enclose them in square brackets to prevent the colons
    being mistaken for a :port suffix.
  - Remove 0001-Revert-the-default-for-font-bolding-style.patch
    (merged upstream), putty-04-nodate.diff (no longer needed).

Files

/usr/bin/pageant
/usr/bin/plink
/usr/bin/pscp
/usr/bin/psftp
/usr/bin/psusan
/usr/bin/pterm
/usr/bin/putty
/usr/bin/puttygen
/usr/share/applications/putty.desktop
/usr/share/doc/packages/putty
/usr/share/doc/packages/putty/authplugin.but
/usr/share/doc/packages/putty/blurb.but
/usr/share/doc/packages/putty/chmextra.but
/usr/share/doc/packages/putty/config.but
/usr/share/doc/packages/putty/errors.but
/usr/share/doc/packages/putty/faq.but
/usr/share/doc/packages/putty/feedback.but
/usr/share/doc/packages/putty/gs.but
/usr/share/doc/packages/putty/index.but
/usr/share/doc/packages/putty/intro.but
/usr/share/doc/packages/putty/man-pageant.but
/usr/share/doc/packages/putty/man-plink.but
/usr/share/doc/packages/putty/man-pscp.but
/usr/share/doc/packages/putty/man-psftp.but
/usr/share/doc/packages/putty/man-psocks.but
/usr/share/doc/packages/putty/man-psusan.but
/usr/share/doc/packages/putty/man-pterm.but
/usr/share/doc/packages/putty/man-putty.but
/usr/share/doc/packages/putty/man-puttygen.but
/usr/share/doc/packages/putty/man-puttytel.but
/usr/share/doc/packages/putty/mancfg.but
/usr/share/doc/packages/putty/manpages.but
/usr/share/doc/packages/putty/pageant.but
/usr/share/doc/packages/putty/pgpkeys.but
/usr/share/doc/packages/putty/plink.but
/usr/share/doc/packages/putty/pscp.but
/usr/share/doc/packages/putty/psftp.but
/usr/share/doc/packages/putty/pubkey.but
/usr/share/doc/packages/putty/pubkeyfmt.but
/usr/share/doc/packages/putty/site.but
/usr/share/doc/packages/putty/sshnames.but
/usr/share/doc/packages/putty/udp.but
/usr/share/doc/packages/putty/using.but
/usr/share/doc/packages/putty/version.but
/usr/share/doc/packages/putty/vids.but
/usr/share/licenses/putty
/usr/share/licenses/putty/LICENCE
/usr/share/man/man1/pageant.1.gz
/usr/share/man/man1/plink.1.gz
/usr/share/man/man1/pscp.1.gz
/usr/share/man/man1/psftp.1.gz
/usr/share/man/man1/psusan.1.gz
/usr/share/man/man1/pterm.1.gz
/usr/share/man/man1/putty.1.gz
/usr/share/man/man1/puttygen.1.gz
/usr/share/pixmaps/pterm.png
/usr/share/pixmaps/pterm.xpm
/usr/share/pixmaps/putty.png
/usr/share/pixmaps/putty.xpm


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 18:42:22 2024