Security upgrade to new upstream release 0.67.
Unix-relevant changes: * Security fix: a buffer overrun in the old-style SCP protocol when receiving the header of each file downloaded from the server is fixed. (CVE-2016-2563) * Assorted other robustness fixes for crashes and memory leaks. MFH: 2016Q1 Security: 7f0fbb30-e462-11e5-a3f3-080027ef73ec Security: CVE-2016-2563
This commit is contained in:
parent
e347c961e3
commit
56dcd4e91d
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=410527
@ -1,8 +1,7 @@
|
||||
# $FreeBSD$
|
||||
|
||||
PORTNAME= putty
|
||||
PORTVERSION= 0.66
|
||||
PORTREVISION= 1
|
||||
PORTVERSION= 0.67
|
||||
CATEGORIES= security ipv6
|
||||
MASTER_SITES= http://the.earth.li/~sgtatham/putty/${PORTVERSION}/ \
|
||||
ftp://ftp.chiark.greenend.org.uk/users/sgtatham/putty-latest/
|
||||
@ -44,7 +43,8 @@ MAKE_ARGS+= GTK_CONFIG=:
|
||||
|
||||
.if ${PORT_OPTIONS:MGSSAPI}
|
||||
_COMPAT= -DSTATIC_GSSAPI
|
||||
USES+= gssapi:mit
|
||||
USES+= gssapi:base,flags
|
||||
MAKE_ARGS+= KRB5CONFIG=$(KRB5CONFIG)
|
||||
.else
|
||||
_COMPAT= -DNO_GSSAPI
|
||||
.endif
|
||||
|
@ -1,2 +1,2 @@
|
||||
SHA256 (putty-0.66.tar.gz) = fe7312f66c54865868b362f4b79bd1fbe7ce9e8b1fd504b04034182db1f32993
|
||||
SIZE (putty-0.66.tar.gz) = 1948323
|
||||
SHA256 (putty-0.67.tar.gz) = 80192458e8a46229de512afeca5c757dd8fce09606b3c992fbaeeee29b994a47
|
||||
SIZE (putty-0.67.tar.gz) = 1955547
|
||||
|
Loading…
Reference in New Issue
Block a user