Update to 0.57:

PuTTY 0.57, released today, fixes two security holes which can
allow a malicious SFTP server to execute code of its choice on a
PSCP or PSFTP client connecting to it. We recommend everybody
upgrade to 0.57 as soon as possible.
This commit is contained in:
wiz 2005-03-29 14:40:09 +00:00
parent b4228a464e
commit 07d62ffe48
2 changed files with 6 additions and 6 deletions

View file

@ -1,7 +1,7 @@
# $NetBSD: Makefile,v 1.1.1.1 2004/10/29 23:00:30 xtraeme Exp $
# $NetBSD: Makefile,v 1.2 2005/03/29 14:40:09 wiz Exp $
#
DISTNAME= putty-0.56
DISTNAME= putty-0.57
CATEGORIES= security
MASTER_SITES= http://the.earth.li/~sgtatham/putty/latest/

View file

@ -1,7 +1,7 @@
$NetBSD: distinfo,v 1.2 2005/02/24 13:10:12 agc Exp $
$NetBSD: distinfo,v 1.3 2005/03/29 14:40:09 wiz Exp $
SHA1 (putty-0.56.tar.gz) = 5ab52f9ebf90577f708fc90650e7b54e6ef9120e
RMD160 (putty-0.56.tar.gz) = b4a99bc41558aaa14c2c3662177bc3dfcb4c0760
Size (putty-0.56.tar.gz) = 1307512 bytes
SHA1 (putty-0.57.tar.gz) = 006e336c9c5a77538f22f545c38ca2afb0dd46e9
RMD160 (putty-0.57.tar.gz) = c44e61b6fb8899ab2a6f2ee6f265085281eb866b
Size (putty-0.57.tar.gz) = 1319513 bytes
SHA1 (patch-aa) = 843dd63165d715ca7e6c3c4b573d9e5d560beae1
SHA1 (patch-ab) = a96d4630fc8a74dd373fa66c3665ab17f6290797