security update to PuTTY 0.67
This release fixes a security hole in PSCP, in the old-style SCP protocol. A server sending a malformed header before the contents of the file could overrun a buffer exploitably in PSCP. [CVE-2016-2563] plus "Assorted other fixes for crash-type bugs (but none known to be exploitable)".
This commit is contained in:
parent
2c0fb50c03
commit
7070876d4d
@ -1,9 +1,9 @@
|
||||
# $OpenBSD: Makefile,v 1.20 2015/11/07 17:46:06 sthen Exp $
|
||||
# $OpenBSD: Makefile,v 1.21 2016/03/05 12:58:20 sthen Exp $
|
||||
|
||||
COMMENT-main= SSH and telnet client
|
||||
COMMENT-gui= PuTTY GUI clients
|
||||
|
||||
V= 0.66
|
||||
V= 0.67
|
||||
DISTNAME= putty-$V
|
||||
PKGNAME-main= ${DISTNAME}
|
||||
PKGNAME-gui= ${DISTNAME:S/putty/putty-gui/}
|
||||
|
@ -1,2 +1,2 @@
|
||||
SHA256 (putty-0.66.tar.gz) = /nMS9mxUhlhos2L0t5vR++fOnosf1QSwQDQYLbHzKZM=
|
||||
SIZE (putty-0.66.tar.gz) = 1948323
|
||||
SHA256 (putty-0.67.tar.gz) = gBkkWOikYineUSr+ylx1fdj84JYGs8mS+67u4puZSkc=
|
||||
SIZE (putty-0.67.tar.gz) = 1955547
|
||||
|
Loading…
Reference in New Issue
Block a user