security update to PuTTY 0.67

This release fixes a security hole in PSCP, in the old-style SCP
protocol. A server sending a malformed header before the contents of the
file could overrun a buffer exploitably in PSCP. [CVE-2016-2563]

plus "Assorted other fixes for crash-type bugs (but none known to be
exploitable)".
This commit is contained in:
sthen 2016-03-05 12:58:20 +00:00
parent 2c0fb50c03
commit 7070876d4d
2 changed files with 4 additions and 4 deletions

View File

@ -1,9 +1,9 @@
# $OpenBSD: Makefile,v 1.20 2015/11/07 17:46:06 sthen Exp $
# $OpenBSD: Makefile,v 1.21 2016/03/05 12:58:20 sthen Exp $
COMMENT-main= SSH and telnet client
COMMENT-gui= PuTTY GUI clients
V= 0.66
V= 0.67
DISTNAME= putty-$V
PKGNAME-main= ${DISTNAME}
PKGNAME-gui= ${DISTNAME:S/putty/putty-gui/}

View File

@ -1,2 +1,2 @@
SHA256 (putty-0.66.tar.gz) = /nMS9mxUhlhos2L0t5vR++fOnosf1QSwQDQYLbHzKZM=
SIZE (putty-0.66.tar.gz) = 1948323
SHA256 (putty-0.67.tar.gz) = gBkkWOikYineUSr+ylx1fdj84JYGs8mS+67u4puZSkc=
SIZE (putty-0.67.tar.gz) = 1955547