PuTTY 0.76 is released

Simon Tatham anakin at pobox.com
Sat Jul 17 11:56:36 BST 2021

PuTTY version 0.76 is released

All the pre-built binaries, and the source code, are now available
from the PuTTY website at


This is almost entirely a bug fix release based on 0.75. It also
contains one minor new feature with potential security use:

 - Option to abandon an SSH connection if the server allows you to
   authenticate in a trivial manner (with no passwords, responses or
   signatures of any kind). This kind of authentication is sometimes
   legitimate, but can also be used by malicious servers to spoof
   parts of the real authentication. PuTTY's main defence against this
   is the trust sigils introduced in 0.71, but this new option
   provides an extra line of defence.

Bugs fixed in this release include:

 - Windows PuTTY: turning on the 'Use system colours' config option
   caused PuTTY to crash immediately on opening the terminal window.

 - Windows PuTTY: named pipes used to communicate with Pageant were
   kept open for the lifetime of the PuTTY process, causing a leak of
   handles and potentially causing Pageant to hang if too many were
   active at once.

 - Windows PuTTY: if you used the mouse to 'hold down' the buttons at
   the ends of the terminal's scrollbar, the window would fail to
   update until you let go of the mouse button again.

 - Changing the colour palette in mid-session using the 'Change
   Settings' dialog box would not take effect immediately, but instead
   would delay until a palette reset happened for some other reason.

 - Changing the colour palette under server control could be
   unreliable if multiple changes were sent very quickly.

 - Any of the tools reading a private key file could tight-loop by
   accident if the file was incomplete (e.g. missing its final

 - Windows Pageant: the GUI key list window forgot to specify the
   lengths of the stored keys.

 - Windows: if you used MIT Kerberos for Windows, the 'Restart
   Session' function would cause a crash inside the Kerberos library.

Enjoy using PuTTY!


for k in [pow(x,37,0x1a1298d262b49c895d47f) for x in [0x50deb914257022de7fff,
0x213558f2215127d5a2d1, 0x90c99e86d08b91218630, 0x109f3d0cfbf640c0beee7,
0xc83e01379a5fbec5fdd1, 0x19d3d70a8d567e388600e, 0x534e2f6e8a4a33155123]]:
 print("".join([chr(32+3*((k>>x)&1))for x in range(79)])) # <anakin at pobox.com>

More information about the PuTTY-announce mailing list