SECURITY update to PuTTY 0.66

"This release fixes a security hole in the terminal emulation code.
Writing a particular escape sequence to the screen in a PuTTY terminal
session could cause the terminal code to read *and potentially write*
memory outside its own data structures. This might be exploitable, so
everybody should upgrade to a fixed version."
This commit is contained in:
sthen 2015-11-07 17:46:06 +00:00
parent f22f5c60c6
commit 8254c98c8a
2 changed files with 5 additions and 5 deletions

View File

@ -1,9 +1,9 @@
# $OpenBSD: Makefile,v 1.19 2015/09/12 20:22:35 sthen Exp $
# $OpenBSD: Makefile,v 1.20 2015/11/07 17:46:06 sthen Exp $
COMMENT-main= SSH and telnet client
COMMENT-gui= PuTTY GUI clients
V= 0.65
V= 0.66
DISTNAME= putty-$V
PKGNAME-main= ${DISTNAME}
PKGNAME-gui= ${DISTNAME:S/putty/putty-gui/}
@ -20,7 +20,7 @@ WANTLIB-main = c pthread
WANTLIB-gui += X11 Xcomposite Xcursor Xdamage Xext Xfixes Xi Xinerama
WANTLIB-gui += Xrandr Xrender atk-1.0 c cairo fontconfig freetype
WANTLIB-gui += gdk-x11-2.0 gdk_pixbuf-2.0 gio-2.0 glib-2.0 gobject-2.0
WANTLIB-gui += gtk-x11-2.0 m pango-1.0 pangocairo-1.0 pangoft2-1.0
WANTLIB-gui += gtk-x11-2.0 pango-1.0 pangocairo-1.0 pangoft2-1.0
WANTLIB-gui += pthread z ${MODGETTEXT_WANTLIB}
CONFIGURE_STYLE= gnu

View File

@ -1,2 +1,2 @@
SHA256 (putty-0.65.tar.gz) = 1UPB/UlE6lHUbUq/Mb+4zem9HGXLNtxrg+Uc6HVmDKA=
SIZE (putty-0.65.tar.gz) = 1937861
SHA256 (putty-0.66.tar.gz) = /nMS9mxUhlhos2L0t5vR++fOnosf1QSwQDQYLbHzKZM=
SIZE (putty-0.66.tar.gz) = 1948323