PuTTY 歷史版本列表
- 2024 軟體跟著走
- 檔案傳輸
- 版本數量 22
- Simon Tatham
- 開源軟體
- 評價 80 分
更新時間:2019-07-20
更新細節:
What's new in this version:
- It fixes a small number of further security issues found by the 2019 EU-funded HackerOne bug bounty, and a variety of other bugs introduced in 0.71
更新時間:2019-07-20
更新細節:
What's new in this version:
Superstring 3.3.4
- Adds a zoom feature to the editor
- Improves video quality
- Fixes minor issues
Superstring 3.2.8
- Adds new "GFS Neohellenic" font
- Improves stability
- Fixes minor issues
Superstring 3.2.6
- Change log not available for this version
Superstring 3.2.4
- Change log not available for this version
Superstring 3.2.2
- Adds "Appearance" in settings
- Improves stability
- Fixes minor issues
Superstring 3.2.0
- Adds a new "Direction Sign" text style
- Removes the background color to increase performance
- Improves stability
- Fixes minor issues
更新時間:2019-07-20
更新細節:
更新時間:2019-05-22
更新細節:
更新時間:2019-05-20
更新細節:
更新時間:2019-03-16
更新細節:
What's new in this version:
Security fixes found by an EU-funded bug bounty programme:
- a remotely triggerable memory overwrite in RSA key exchange, which can occur before host key verification
- potential recycling of random numbers used in cryptography
- on Windows, hijacking by a malicious help file in the same directory as the executable
- on Unix, remotely triggerable buffer overflow in any kind of server-to-client forwarding
- multiple denial-of-service attacks that can be triggered by writing to the terminal
- Other security enhancements: major rewrite of the crypto code to remove cache and timing side channels
- We now provide pre-built binaries for Windows on Arm
- Hardware-accelerated versions of the most common cryptographic primitives: AES, SHA-256, SHA-1
- GTK PuTTY now supports non-X11 displays (e.g. Wayland) and high-DPI configurations
- Type-ahead now works as soon as a PuTTY window is opened: keystrokes typed before authentication has finished will be buffered instead of being dropped
- Support for GSSAPI key exchange: an alternative to the older GSSAPI authentication system which can keep your forwarded Kerberos credentials updated during a long session
- More choices of user interface for clipboard handling
- New terminal features: support the REP escape sequence (fixing an ncurses screen redraw failure), true colour, and SGR 2 dim text
- Pressing Ctrl+Shift+PgUp or Ctrl+Shift+PgDn now takes you straight to the top or bottom of the terminal scrollback
更新時間:2019-03-16
更新細節:
更新時間:2017-07-09
更新細節:
What's new in this version:
- Security fix: the Windows PuTTY binaries should no longer be vulnerable to hijacking by specially named DLLs in the same directory, even a name we missed when we thought we'd fixed this in 0.69. See vuln-indirect-dll-hijack-3
- Windows PuTTY should be able to print again, after our DLL hijacking defences broke that functionality
- Windows PuTTY should be able to accept keyboard input outside the current code page, after our DLL hijacking defences broke that too
更新時間:2017-04-29
更新細節:
更新時間:2017-02-22
更新細節:
What's new in this version:
- Security fix: an integer overflow bug in the agent forwarding code
- Security fix: the Windows PuTTY binaries should no longer be vulnerable to hijacking by specially named DLLs in the same directory (on versions of Windows where they previously were)
- Windows PuTTY no longer sets a restrictive process ACL by default, because this turned out to inconvenience too many legitimate applications such as NVDA and TortoiseGit. You can still manually request a restricted ACL using the command-line option -restrict-acl
- The Windows PuTTY tools now come in a 64-bit version
- The Windows PuTTY tools now have Windows's ASLR and DEP security features turned on
- Support for elliptic-curve cryptography (the NIST curves and 25519), for host keys, user authentication keys, and key exchange
- Support for importing and exporting OpenSSH's new private key format
- Host key preference policy change: PuTTY prefers host key formats for which it already knows the key
- Run-time option (from the system menu / Ctrl-right-click menu) to retrieve other host keys from the same server (which cross-certifies them using the session key established using an already-known key) and add them to the known host-keys database