summaryrefslogtreecommitdiff
path: root/security/putty/patches
AgeCommit message (Collapse)AuthorFilesLines
2021-08-12putty: remove patch that was removed from distinfo during 0.76 updatewiz1-13/+0
2021-07-24putty: Update to 0.67ryoon2-43/+10
Changelog: These features are new in 0.76 (released 2021-07-17): New option to abandon an SSH connection if the server allows you to authenticate in a trivial manner. Bug fix: Windows PuTTY crashed when the 'Use system colours' option was used. Bug fix: crash on Windows when using MIT Kerberos together with 'Restart Session'. Bug fix: Windows PuTTY leaked named pipes after contacting Pageant. Bug fix: Windows PuTTY didn't update the window while you held down the scrollbar arrow buttons long enough to 'key-repeat'. Bug fix: user colour-palette reconfiguration via 'Change Settings' were delayed-action. Bug fix: server colour-palette reconfigurations were sometimes lost. Bug fix: a tight loop could occur on reading a truncated private key file. Bug fix: the Windows Pageant GUI key list didn't display key lengths. These features were new in 0.75 (released 2021-05-08): Security fix: on Windows, a server could DoS the whole Windows GUI by telling the PuTTY window to change its title repeatedly at high speed. Pageant now supports loading a key still encrypted, and decrypting it later by prompting for the passphrase on first use. Upgraded default SSH key fingerprint format to OpenSSH-style SHA-256. Upgraded private key file format to PPK3, with improved passphrase hashing and no use of SHA-1. Terminal now supports ESC [ 9 m for strikethrough text. New protocols: bare ssh-connection layer for use over already-secure IPC channels, and SUPDUP for talking to very old systems such as PDP-10s. PuTTYgen now supports alternative provable-prime generation algorithm for RSA and DSA. The Unix tools can now connect directly to a Unix-domain socket.
2020-11-24putty: Fix PuTTY wish pscp-port-0ryoon1-0/+35
https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/pscp-port-0.html
2020-07-30putty: fix build on Linuxtnn1-9/+3
2020-06-29putty: Update to 0.74ryoon1-13/+0
Changelog: This release fixes the following security issues: - In some situations an SSH server could cause PuTTY to access freed mdmory by pretending to accept an SSH key and then refusing the actual signature. It can only happen if you're using an SSH agent. - New configuration option to disable PuTTY's default policy of changing its host key algorithm preferences to prefer keys it already knows. (There is a theoretical information leak in this policy.) Other bug fixes include: - Windows installer: the text in the installer UI is now visible in Windows high-contrast mode. (Previously it was white on white by mistake.) - Windows 7: fixed spurious OS out-of-memory error when reading passwords from a Windows console (e.g. psftp). - Terminal crash: the dreaded "line==NULL" error could happen if an application switched between the main and alternate screens while the user was looking at the scrollback. - Terminal crash: the terminal could fail an assertion when sending an empty answerback string, and when pasting text none of whose characters exist in the selected character set. - SSH: fixed endless memory-allocating loop that could be triggered by the combination of a misbehaving SSH agent and PuTTY's bug compatibility mode for padded RSA signatures. - File transfer: when uploading files to some SFTP servers (e.g. the one in proftpd's mod_sftp), PSFTP would consume up to 4GB of local memory before sending anything to the server. - Terminal behaviour: sometimes the cursor was put in the wrong place after restoring from the alternate screen. - GTK: fixed font size calculation when using newer Pango libraries (e.g. the one on Ubuntu 20.04). - GTK: scroll wheel events now work in unusual environments like VNC.
2019-12-19Avoid using a non-literal string as format string.joerg1-4/+4
2019-10-01Update to 0.73ryoon3-41/+41
Changelog: Vulnerabilities fixed in this release include: - On Windows, the listening sockets used for local port forwarding were opened in a mode that did not prevent other processes from also listening on the same ports and stealing some of the incoming connections. - In the PuTTY terminal, bracketed paste mode was broken in 0.72, in a way that made the pasted data look like manual keyboard input. So any application relying on the bracketing sequences to protect against malicious clipboard contents would have been misled. - An SSH-1 server could trigger an access to freed memory by sending the SSH1_MSG_DISCONNECT message. Not known to be exploitable. Other bug fixes include: - Windows Plink no longer crashes on startup when it tries to tell you it's reusing an existing SSH connection. - Windows PuTTY now updates its terminal window size correctly if the screen resolution changes while it's maximised. - If you display the coloured error messages from gcc in the PuTTY terminal, there is no longer a missing character if a colour change happens exactly at the end of a line. - If you use the 'Clear Scrollback' menu option or escape sequence while text in the scrollback is selected, it no longer causes an assertion failure.
2019-04-01Update to 0.71ryoon7-113/+46
Changelog: These features were new in 0.70 (released 2017-07-08): Security fix: the Windows PuTTY binaries should no longer be vulnerable to hijacking by specially named DLLs in the same directory, even a name we missed when we thought we'd fixed this in 0.69. See vuln-indirect-dll-hijack-3. Windows PuTTY should be able to print again, after our DLL hijacking defences broke that functionality. Windows PuTTY should be able to accept keyboard input outside the current code page, after our DLL hijacking defences broke that too. These features are new in 0.71 (released 2019-03-16): Security fixes found by an EU-funded bug bounty programme: a remotely triggerable memory overwrite in RSA key exchange, which can occur before host key verification potential recycling of random numbers used in cryptography on Windows, hijacking by a malicious help file in the same directory as the executable on Unix, remotely triggerable buffer overflow in any kind of server-to-client forwarding multiple denial-of-service attacks that can be triggered by writing to the terminal Other security enhancements: major rewrite of the crypto code to remove cache and timing side channels. User interface changes to protect against fake authentication prompts from a malicious server. We now provide pre-built binaries for Windows on Arm. Hardware-accelerated versions of the most common cryptographic primitives: AES, SHA-256, SHA-1. GTK PuTTY now supports non-X11 displays (e.g. Wayland) and high-DPI configurations. Type-ahead now works as soon as a PuTTY window is opened: keystrokes typed before authentication has finished will be buffered instead of being dropped. Support for GSSAPI key exchange: an alternative to the older GSSAPI authentication system which can keep your forwarded Kerberos credentials updated during a long session. More choices of user interface for clipboard handling. New terminal features: support the REP escape sequence (fixing an ncurses screen redraw failure), true colour, and SGR 2 dim text. Pressing Ctrl+Shift+PgUp or Ctrl+Shift+PgDn now takes you straight to the top or bottom of the terminal scrollback.
2018-08-01putty: fix build after gdk_beep became deprecated.maya2-2/+36
bump pkgrevision for paranoia.
2017-03-17putty: amend patch to use the BSD syntax on BSDs, and the alternatemaya1-4/+7
syntax otherwise -- it has a better chance of working.
2017-03-17putty: update to 0.68maya5-58/+33
PuTTY 0.68, released today, supports elliptic-curve cryptography for host keys, user authentication keys, and key exchange. Also, for the first time, it comes in a 64-bit Windows version. This update may create a build issue for non-BSD due to ancient functions being different on BSD and SYSV. there's always macros if this fails.
2015-04-08Update to 0.64ryoon1-0/+13
* Avoid compilation error on tolower and char type. Changelog: 2015-02-28 PuTTY 0.64 released, fixing a SECURITY HOLE PuTTY 0.64, released today, fixes a security hole in 0.63 and before: private-key-not-wiped-2. Also diffie-hellman-range-check has been argued to be a security hole. In addition to these and other less critical bug fixes, 0.64 also supports the major new feature of sharing an SSH connection between multiple instances of PuTTY and its tools, and a command-line and config option to specify the expected host key(s).
2014-03-06Fix 64bit time_t use. Bump revision.joerg1-0/+21
2013-08-07update to 0.63drochner10-212/+31
This fixes a buffer overflow which was patched in pkgsrc (CVE-2013-4852), two other buffer overflows (CVE-2013-4206, CVE-2013-4207), and it clears private keys after use now (CVE-2013-4208). Other than that, there are mostly bug fixes from 0.62 and a few small features.
2013-08-06add patch from upstream to fix possible heap overflow in SSH handshakedrochner3-1/+49
due to integer overflow (CVE-2013-4852) bump PKGREV
2012-11-01Don't order function pointers directly. Don't use non-literals as formatjoerg4-4/+45
strings. Fix return type of intermediate used for return value of wcrtomb.
2012-05-07Fix build with latest glib2. (not the usual thing, either)dholland1-0/+87
2012-02-22Add a patch from the putty-devel package (not needed on my -current though)wiz1-0/+33
2012-02-22Update to 0.62, keeping all pkgsrc patches which have not been fed upstream ↵wiz14-162/+76
(hi roy! hi rillig!) 2011-12-10 PuTTY 0.62 released PuTTY 0.62 is out, containing only bug fixes from 0.61, in particular a security fix preventing passwords from being accidentally retained in memory. 2011-11-27 PuTTY 0.62 pre-release builds available PuTTY 0.61 had a few noticeable bugs in it (but nothing security-related), so we are planning to make a 0.62 release containing just bug fixes. The Wishlist page lists the bugs that will be fixed by the 0.62 release. The Download page now contains pre-release snapshots of 0.62, which contain those bug fixes and should be otherwise stable. (The usual development snapshots, containing other development since 0.61, are also still available.) 2011-07-12 PuTTY 0.61 is released PuTTY 0.61 is out, after over four years (sorry!), with new features, bug fixes, and compatibility updates for Windows 7 and various SSH server software.
2011-12-10Fix build failure on Solaris (PR 28226).cheusov1-4/+20
2009-02-25Add patches so that the home/end keys work on BSD servers as well as Linuxroy3-0/+105
2007-10-13Update putty to 0.60.obache1-7/+6
Patch provided by Jukka Salmi in PR 37056. These features are new in beta 0.60 (released 2007-04-29): * Pressing Ctrl+Break now sends a serial break signal. (The previous behaviour can still be obtained with Ctrl+C.) * Serial ports higher than COM9 now no longer need a leading \\.\. * You can now store a host name in the Default Settings. * Bug fix: serial connections and local proxies should no longer crash all the time. * Bug fix: configuring the default connection type to serial should no longer cause the configuration dialog to be skipped on startup. * Bug fix: "Unable to read from standard input" should now not happen, or if it still does it should produce more detailed diagnostics. * Bug fix: fixed some malformed SSH-2 packet generation. * Other minor bug fixes.
2007-03-17Updated putty to 0.59.rillig2-74/+12
Changes since 0.58: * PuTTY can now connect to local serial ports as well as making network connections. * Windows PuTTY now supports "local proxying", where a network connection is replaced by a local command. (Unix PuTTY has supported this since it was first released in 0.54.) Also, Plink has gained a "-nc" mode where the primary channel is replaced by an SSH tunnel, which makes it particularly useful as the local command to run. * Improved speed of SSH on Windows (particularly SSH-2 key exchange and public-key authentication). * Improved SFTP throughput. * Various cryptographic improvements in SSH-2, including SDCTR cipher modes, a workaround for a weakness in CBC cipher modes, and Diffie-Hellman group exchange with SHA-256. * Support for the Arcfour cipher in SSH-2. * Support for sending terminal modes in SSH. * When Pageant is running and an SSH key is specified in the configuration, PuTTY will now only try Pageant authentication with that key. This gets round a problem where some servers would only allow a limited number of keys to be offered before disconnecting. * Support for SSH-2 password expiry mechanisms, and various other improvements and bugfixes in authentication. * A change to the SSH-2 password camouflage mechanism in 0.58 upset some Cisco servers, so we have reverted to the old method. * The Windows version now comes with documentation in HTML Help format. (Windows Vista does not support the older WinHelp format. However, we still provide documentation in that format, since Win95 does not support HTML Help.) * On Windows, when pasting as RTF, attributes of the selection such as colours and formatting are also pasted. * Ability to configure font quality on Windows (including antialiasing and ClearType). * The terminal is now restored to a sensible state when reusing a window to restart a session. * We now support an escape sequence invented by xterm which lets the server clear the scrollback (CSI 3 J). This is useful for applications such as terminal locking programs. * Improvements to the Unix port: + now compiles cleanly with GCC 4 + now has a configure script, and should be portable to more platforms * Bug fix: 0.58 utterly failed to run on some installations of Windows XP. * Bug fix: PSCP and PSFTP now support large files (greater than 4 gigabytes), provided the underlying operating system does too. * Bug fix: PSFTP (and PSCP) sometimes ran slowly and consumed lots of CPU when started directly from Windows Explorer. * Bug fix: font linking (the automatic use of other fonts on the system to provide Unicode characters not present in the selected one) should now work again on Windows, after being broken in 0.58. (However, it unfortunately still won't work for Arabic and other right-to-left text.) * Bug fix: if the remote server saturated PuTTY with data, PuTTY could become unresponsive. * Bug fix: certain large clipboard operations could cause PuTTY to crash. * Bug fix: SSH-1 connections tended to crash, particularly when using port forwarding. * Bug fix: SSH Tectia Server would reject SSH-2 tunnels from PuTTY due to a malformed request. * Bug fix: SSH-2 login banner messages were being dropped silently under some circumstances. * Bug fix: the cursor could end up in the wrong place when a server-side application used the alternate screen. * Bug fix: on Windows, PuTTY now tries harder to find a suitable place to store its random seed file PUTTY.RND (previously it was tending to end up in C:\ or C:\WINDOWS). * Bug fix: IPv6 should now work on Windows Vista. * Numerous other bugfixes, as usual.
2005-04-13Fixed the patched to use the <ctype.h> functions correctly, that is:rillig10-46/+47
isalpha((unsigned char)*s) instead of isalpha((int)*s). Also replaced WRKSRC with BUILD_DIRS, which is more appropriate. Approved by jlam.
2005-04-06Update to 0.58.xtraeme11-57/+164
Changes: # Wildcards (mput/mget) and recursive file transfer in PSFTP. # You can now save your session details from the Change Settings dialog box, after you've started your session. # Various improvements to Unicode support, including: * support for right-to-left and bidirectional text (Arabic, Hebrew etc). Thanks to arabeyes.org for design and most of the implementation. * support for Arabic text shaping, again thanks to arabeyes.org. * support for Unicode combining characters. # Support for the xterm 256-colour control sequences. # Port forwardings can now be reconfigured in mid-session. # Support for IPv6. Thanks to unfix.org for having patiently maintained the patch for this until we were finally ready to integrate it. # More configurability and flexibility in SSH-2 key exchange. In particular, PuTTY can now initiate repeat key exchange during the session, which means that if your server doesn't initiate it (OpenSSH is known not to bother) you can still have the cryptographic benefits. # Bug fix: display artefacts caused by characters overflowing their character cell should now all be gone. (This would probably have bothered Windows ClearType users more than anyone else.) # Bug fix: keepalives are now supported everywhere. (Previously they were supported by Windows GUI PuTTY, but were missing in Plink, PSFTP and the Unix port.) # Miscellaneous improvements for CJK/IME users; many thanks to Hung-Te Lin for assistance.
2004-10-29Initial import of putty-0.56 from pkgsrc-wip.xtraeme2-0/+97
PuTTY is a client program for the SSH, Telnet and Rlogin network protocols. These protocols are all used to run a remote session on a computer, over a network. PuTTY implements the client end of that session: the end at which the session is displayed, rather than the end at which it runs.