Security upgrade to new upstream release 0.67.

Unix-relevant changes:
* Security fix: a buffer overrun in the old-style SCP protocol when receiving
  the header of each file downloaded from the server is fixed. (CVE-2016-2563)
* Assorted other robustness fixes for crashes and memory leaks.

MFH:		2016Q1
Security:	7f0fbb30-e462-11e5-a3f3-080027ef73ec
Security:	CVE-2016-2563
This commit is contained in:
Matthias Andree 2016-03-07 16:54:16 +00:00
parent e347c961e3
commit 56dcd4e91d
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=410527
2 changed files with 5 additions and 5 deletions

View file

@ -1,8 +1,7 @@
# $FreeBSD$
PORTNAME= putty
PORTVERSION= 0.66
PORTREVISION= 1
PORTVERSION= 0.67
CATEGORIES= security ipv6
MASTER_SITES= http://the.earth.li/~sgtatham/putty/${PORTVERSION}/ \
ftp://ftp.chiark.greenend.org.uk/users/sgtatham/putty-latest/
@ -44,7 +43,8 @@ MAKE_ARGS+= GTK_CONFIG=:
.if ${PORT_OPTIONS:MGSSAPI}
_COMPAT= -DSTATIC_GSSAPI
USES+= gssapi:mit
USES+= gssapi:base,flags
MAKE_ARGS+= KRB5CONFIG=$(KRB5CONFIG)
.else
_COMPAT= -DNO_GSSAPI
.endif

View file

@ -1,2 +1,2 @@
SHA256 (putty-0.66.tar.gz) = fe7312f66c54865868b362f4b79bd1fbe7ce9e8b1fd504b04034182db1f32993
SIZE (putty-0.66.tar.gz) = 1948323
SHA256 (putty-0.67.tar.gz) = 80192458e8a46229de512afeca5c757dd8fce09606b3c992fbaeeee29b994a47
SIZE (putty-0.67.tar.gz) = 1955547