Security fixes found by the EU-funded bug bounty: - two separate vulnerabilities affecting the obsolete SSH-1 protocol, both available before host key checking - a vulnerability in all the SSH client tools (PuTTY, Plink, PSFTP and PSCP) if a malicious program can impersonate Pageant Changelog: https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html Switch off -DSTATIC_GSSAPI build as that produces non-working executables (assertion failures). Bug has been reported upstream. MFH: 2019Q3 Security: 5914705c-ab03-11e9-a4f9-080027ac955c
3 lines
152 B
Text
3 lines
152 B
Text
TIMESTAMP = 1563631735
|
|
SHA256 (putty-0.72.tar.gz) = f236b5a26b0905809b3cd190158e8b95d81f86ad34fdd97a4312c1877f2cec5f
|
|
SIZE (putty-0.72.tar.gz) = 2449516
|