(CVE-2016-7406) and a problem importing malicious OpenSSH keys (CVE-2016-7407) both of which could result in arbitrary code running as root in some conditions (though the worst one requires usernames including '%' which is uncommon with OpenBSD as adduser and useradd reject this, however it is possible by editing the password file directly). See https://matt.ucc.asn.au/dropbear/CHANGES for more details.
27 lines
510 B
Makefile
27 lines
510 B
Makefile
# $OpenBSD: Makefile,v 1.2 2016/09/21 10:06:27 sthen Exp $
|
|
|
|
COMMENT= small SSH server and client
|
|
|
|
DISTNAME= dropbear-2016.74
|
|
EXTRACT_SUFX= .tar.bz2
|
|
|
|
CATEGORIES= security net
|
|
|
|
HOMEPAGE= https://matt.ucc.asn.au/dropbear/dropbear.html
|
|
|
|
# unrestrictive, mostly MIT-like, see LICENSE
|
|
PERMIT_PACKAGE_CDROM= Yes
|
|
|
|
WANTLIB += c util z
|
|
|
|
MASTER_SITES= https://matt.ucc.asn.au/dropbear/releases/
|
|
|
|
USE_GMAKE= Yes
|
|
CONFIGURE_STYLE= gnu
|
|
#NO_TEST= Yes
|
|
|
|
post-configure:
|
|
${SUBST_CMD} ${WRKSRC}/options.h
|
|
|
|
.include <bsd.port.mk>
|