SECURITY update to PuTTY 0.66
"This release fixes a security hole in the terminal emulation code. Writing a particular escape sequence to the screen in a PuTTY terminal session could cause the terminal code to read *and potentially write* memory outside its own data structures. This might be exploitable, so everybody should upgrade to a fixed version."
This commit is contained in:
parent
f22f5c60c6
commit
8254c98c8a
@ -1,9 +1,9 @@
|
||||
# $OpenBSD: Makefile,v 1.19 2015/09/12 20:22:35 sthen Exp $
|
||||
# $OpenBSD: Makefile,v 1.20 2015/11/07 17:46:06 sthen Exp $
|
||||
|
||||
COMMENT-main= SSH and telnet client
|
||||
COMMENT-gui= PuTTY GUI clients
|
||||
|
||||
V= 0.65
|
||||
V= 0.66
|
||||
DISTNAME= putty-$V
|
||||
PKGNAME-main= ${DISTNAME}
|
||||
PKGNAME-gui= ${DISTNAME:S/putty/putty-gui/}
|
||||
@ -20,7 +20,7 @@ WANTLIB-main = c pthread
|
||||
WANTLIB-gui += X11 Xcomposite Xcursor Xdamage Xext Xfixes Xi Xinerama
|
||||
WANTLIB-gui += Xrandr Xrender atk-1.0 c cairo fontconfig freetype
|
||||
WANTLIB-gui += gdk-x11-2.0 gdk_pixbuf-2.0 gio-2.0 glib-2.0 gobject-2.0
|
||||
WANTLIB-gui += gtk-x11-2.0 m pango-1.0 pangocairo-1.0 pangoft2-1.0
|
||||
WANTLIB-gui += gtk-x11-2.0 pango-1.0 pangocairo-1.0 pangoft2-1.0
|
||||
WANTLIB-gui += pthread z ${MODGETTEXT_WANTLIB}
|
||||
|
||||
CONFIGURE_STYLE= gnu
|
||||
|
@ -1,2 +1,2 @@
|
||||
SHA256 (putty-0.65.tar.gz) = 1UPB/UlE6lHUbUq/Mb+4zem9HGXLNtxrg+Uc6HVmDKA=
|
||||
SIZE (putty-0.65.tar.gz) = 1937861
|
||||
SHA256 (putty-0.66.tar.gz) = /nMS9mxUhlhos2L0t5vR++fOnosf1QSwQDQYLbHzKZM=
|
||||
SIZE (putty-0.66.tar.gz) = 1948323
|
||||
|
Loading…
Reference in New Issue
Block a user