sthen 6ad8220f49 update to dropbear-2016.74, fixes include a format string vulnerability
(CVE-2016-7406) and a problem importing malicious OpenSSH keys (CVE-2016-7407)
both of which could result in arbitrary code running as root in some conditions
(though the worst one requires usernames including '%' which is uncommon with
OpenBSD as adduser and useradd reject this, however it is possible by editing
the password file directly). See https://matt.ucc.asn.au/dropbear/CHANGES for
more details.
2016-09-21 10:06:27 +00:00

27 lines
510 B
Makefile

# $OpenBSD: Makefile,v 1.2 2016/09/21 10:06:27 sthen Exp $
COMMENT= small SSH server and client
DISTNAME= dropbear-2016.74
EXTRACT_SUFX= .tar.bz2
CATEGORIES= security net
HOMEPAGE= https://matt.ucc.asn.au/dropbear/dropbear.html
# unrestrictive, mostly MIT-like, see LICENSE
PERMIT_PACKAGE_CDROM= Yes
WANTLIB += c util z
MASTER_SITES= https://matt.ucc.asn.au/dropbear/releases/
USE_GMAKE= Yes
CONFIGURE_STYLE= gnu
#NO_TEST= Yes
post-configure:
${SUBST_CMD} ${WRKSRC}/options.h
.include <bsd.port.mk>